期刊文献+

一种改进的TETRA系统鉴权协议 被引量:3

An Improved Authentication Protocol of TETRA
下载PDF
导出
摘要 提出了TETRA(terrestrialtrunkedradio)系统的新的鉴权协议,协议将鉴权算法的运行实体设为HLR(homelocationregister),而不是VLR(visitorlocationregister),当无法保证VLR和HLR之间的通信安全时,所提出的协议仍然可以有效避免产生对已知明文攻击的开放性,同时有利于满足将来网间漫游和认证算法自主性的需要,对于提高实际数字集群通信系统的安全性具有十分重要的意义. An authentication protocol for TETRA with authentication algorithm running in HLR instead of VLR is presented in this paper. The proposed protocol can effectively avoid the generation of an open attack for known text once the communication security between VLR and HLR can not be guaranteed.It is good for roaming between networks, meets the requirements for the independence of the authentication algorithm. The proposed protocol can improve the security of actual digital trunked system.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2005年第2期76-79,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金资助项目(60372094 90204017)
关键词 鉴权 数字集群系统 挑战-应答协议 authentication digital trunked system challenge-response protocol
  • 相关文献

参考文献8

  • 1郑祖辉 鲍智良 等.数字集群移动通信系统[M].北京:电子工业出版社,2001..
  • 2王育民 刘建伟.通信网的安全-理论与技术[M].西安电子科技大学出版社,2002..
  • 3ETSI ETS 300 392-1--1996, Terrestrial trunked radio (TETRA); voice plus data (V+D); part 1:general network design[S].
  • 4邓所云,胡正名,钮心忻,杨义先.移动通信中的双向认证与密钥协商新协议[J].北京邮电大学学报,2002,25(2):78-82. 被引量:11
  • 5ETSI ETS 300 392-7--2003, Terrestrial trunked radio (TETRA); voice plus data (V+D); part 7:security[S].
  • 6ETSI EN 300 392-2--2003, Terrestrial trunked radio(TETRA); voice plus data (V + D) ; part 2: airinterface (AI) [S].
  • 7TETRA MoU Security and Fraud Prevention Group Recommendation 02-2001, End to end voice encryption and key management[S].
  • 8何红永,唐晓梅.数字移动通信中的用户鉴权[J].移动通信,2001,25(7):16-18. 被引量:9

二级参考文献5

  • 1[1]Horn G,Preneel B.Authentication and payment in future mobile systems[J].In Computer Security ESORICS'98 Proceedings,Springer-Verlag,Berlin: 1998,1 485:277-293.
  • 2[2]Horn G,Martin K M,Mitchell C J.Authentication Protocols for mobile network environment value added services[EB/OL].http:∥isg.rhbnc.sc.uk/c jm/Listofpublications.
  • 3[3]Mehrotra A.Mobility and security management in the GSM system and some proposed future improvements[J].Proceedings of the IEEE,1998,86(7):1 480-1 497.
  • 4[4]Shoup V.On formal modules for secure key exchange[EB/OL].http: ∥www.shoup.net/papers,IBM Research Report RZ 3120,1999.
  • 5[5]Park D G,Boyd C,Moon S J.Forward secrecy and Its Application to Future Mobile Communiations Security[A].PKCS2000,LNCS 1751[C].2000.433-445.

共引文献25

同被引文献8

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部