The research and implementation of 3G terminal authentication service

被引:0
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 49 条
[41]   Authentication through Hough transformation generated Signature on G-Let D3 Domain (AHSG) [J].
Sengupta, Madhumita ;
Mandal, J. K. .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :121-130
[42]   Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing [J].
Ali, Asad ;
Lin, Ying-Dar ;
Li, Chi-Yu ;
Lai, Yuan-Cheng .
2020 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC 2020), 2020, :219-224
[43]   End-to-End Security and Seamless Handover Solution for Real-Time Communications over 3G Networks [J].
Diab, Wafaa Bou ;
Tohme, Samir .
Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, :13-22
[44]   Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover [J].
Bi, Ye ;
Jia, Chunfu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (06) :5446-5463
[45]   A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks [J].
Chow, Man Chun ;
Ma, Maode .
SENSORS, 2022, 22 (12)
[46]   A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks [J].
Huang, Jie ;
Huang, Chin-Tser .
2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
[47]   A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks [J].
Ren, Xiongpeng ;
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Zhang, Yinghui .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3642-3656
[48]   Strong and privacy-friendly management of federated identities for service provision over UMTSUne Solution Puissante et Protégeant la vie Privée Pour la Gestion des Identités Pour les Réseaux Mobiles 3G [J].
Christas K. Dimitriadis ;
Despina Polemi .
Annales Des Télécommunications, 2006, 61 (3-4) :418-442
[49]   EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet [J].
Sun, Yunqing ;
Cao, Jin ;
Ma, Maode ;
Zhang, Yinghui ;
Li, Hui ;
Niu, Ben .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :370-387