The research and implementation of 3G terminal authentication service

被引:0
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 49 条
[31]   Mobile Application Protection Solution Based on 3G Security Architecture and OpenID [J].
Feng, Xiang ;
Wu, Yonghe ;
Yan, Xueqiang .
2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, :1-7
[32]   Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks [J].
Sharma M.J. ;
Leung V.C.M. .
International Journal of Security and Networks, 2011, 6 (2-3) :90-100
[33]   Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions [J].
Kazmi, Syed Hussain Ali ;
Hassan, Rosilah ;
Qamar, Faizan ;
Nisar, Kashif ;
Ibrahim, Ag Asri Ag .
SYMMETRY-BASEL, 2023, 15 (06)
[34]   An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G [J].
Chiang, Wei-Kuo ;
Lin, Kai-Heng .
MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04) :1221-1245
[35]   A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X [J].
Ma, Ruhui ;
Cao, Jin ;
Zhang, Yinghui ;
Shang, Chao ;
Xiong, Lihui ;
Li, Hui .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (12) :23976-23992
[36]   A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems [J].
Tuan-Vinh Le ;
Lu, Chung-Fu ;
Hsu, Chien-Lung ;
Do, Trung K. ;
Chou, Yen-Fang ;
Wei, Wei-Cheng .
IEEE ACCESS, 2022, 10 :28975-28990
[37]   Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif [J].
Edris, Ed Kamya Kiyemba ;
Aiash, Mahdi ;
Loo, Jonathan .
ELECTRONICS, 2021, 10 (13)
[38]   One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks [J].
Ntantogian, Christoforos ;
Xenakis, Christos .
WIRELESS PERSONAL COMMUNICATIONS, 2009, 48 (04) :569-584
[39]   One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks [J].
Christoforos Ntantogian ;
Christos Xenakis .
Wireless Personal Communications, 2009, 48 :569-584
[40]   A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions [J].
Khan, Adnan Shahid ;
Sattar, Muhammad Ali ;
Nisar, Kashif ;
Ibrahim, Ag Asri Ag ;
Annuar, Noralifah Binti ;
bin Abdullah, Johari ;
Memon, Shuaib Karim .
APPLIED SCIENCES-BASEL, 2023, 13 (01)