The research and implementation of 3G terminal authentication service

被引:0
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 47 条
  • [21] Implementation of Open Two-Factor Authentication Service applied to Virtual Private Network
    Pham Ngoc Thanh
    Kim, Keecheon
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [22] A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC
    Ranaweera, Pasika
    Yadav, Awaneesh Kumar
    Liyanage, Madhusanka
    Jurcut, Anca Delia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2930 - 2948
  • [23] Verifiable AKA for beyond 3G wireless packet services
    Joseph, Vinod Cherian
    Talukder, Asoke K.
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 215 - +
  • [24] Software Service Signature (S3) for authentication in cloud computing
    Xu, Li
    Cao, Xi
    Zhang, Yuexin
    Wu, Wei
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 905 - 914
  • [25] Software Service Signature (S3) for authentication in cloud computing
    Li Xu
    Xi Cao
    Yuexin Zhang
    Wei Wu
    Cluster Computing, 2013, 16 : 905 - 914
  • [26] A new amended authentication protocol in 3G-WLAN interworking
    Dong, Chundong
    Wang, Cong
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1261 - 1265
  • [27] An Enhanced Secure Access Scheme Based on SIP in 3G Network
    Shi Zhi-yong
    Liu Jia
    Ou Qing-bo
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 476 - +
  • [28] Local fast re-authentication for 3G-WLAN interworking
    Al Shidhani, Ali
    Leung, Victor C. M.
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 309 - 323
  • [29] A Study on fast MMD session control methods in 3G mobile communications
    Komorita, Satoshi
    Agatsuma, Tomonori
    Chiba, Tsunehiko
    Yokota, Hidetoshi
    Idoue, Akira
    Hatori, Mitsutoshi
    PROCEEDINGS OF THE FIRST ITU-T KALEIDOSCOPE ACADEMIC CONFERENCE INNOVATIONS IN NGN: FUTURE NETWORK AND SERVICES, 2008, : 95 - 102
  • [30] Mobile Application Protection Solution Based on 3G Security Architecture and OpenID
    Feng, Xiang
    Wu, Yonghe
    Yan, Xueqiang
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 1 - 7