期刊文献+

移动通信用户身份保密的增强方法 被引量:1

The Enhanced Methods of User Identity's Confidentiality in Mobile Communication
下载PDF
导出
摘要 针对现有移动通信标准中无法完全实现用户身份保密这一问题,该文提出了分别基于公钥密码学和对称密钥密码学的两种改进措施,将用户的真实身份隐蔽在众多的用户标识里,使攻击者不能确切地得到用户身份的具体信息,明显增强了用户身份的保密性,并且分析比较了两种措施的性能。这些改进措施可以用于任何移动通信技术中。 Focused on the scenario that none of the current standards achieves user identity's confidentiality, two enhanced methods are proposed, respectively based on public key cryptography and symmetric key cryptography, in which each user's real identity is concealed among many users' identities. So attackers can not capture the concrete identity information and user identity confidentiality is improved obviously. The performance of the two methods is analyzed and compared. And the proposed methods can be used in other mobile communication technologies.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第9期1459-1462,共4页 Journal of Electronics & Information Technology
关键词 用户身份保密性 国际移动用户身份 临时移动用户身份 User identity confidentiality, Intemational Mobile Subscriber Identity (IMSI), Temporary Mobile Subscriber Identity(TMSI)
  • 相关文献

参考文献4

  • 13GPP TS 33.102 (V6.0.0): 3rd Generation Partnership Project(3GPP); Technical Specification Group (TSG) SA; 3G Security;Security Architecture. Sep. 2003, URL: http:∥www.3gpp.org/ftp/Specs/archive/33_series/33.102/
  • 2RheeMY著 袁超伟译.CDMA蜂窝移动通信与网络安全[M].北京:电子工业出版社,2002.241-243.
  • 3StinsonDR著 冯登国译.密码学原理与实践[M].北京:电子工业出版社,2003.172-176.
  • 4Curtis H W. Subscriber authentication and security in digital cellular networks and under the mobile Internet protocol. [Master Thesis], The University of Texas at Austin, May 2001, URL:http:∥www. portelligent.com/forms/HCThesis.pdf

同被引文献11

  • 1Emmanouil M,Panayiotis K.A distributed privacy-preserving schemefor location-based queries [C]//2010 IEEK International Symposiumon A World of Wireless,Mobile and Multimedia Networks(WoW-MoM).Montreal:IEEE Computer Society,2010.
  • 2Yu Jia C,Li Chun W.A security framework of group location-based mo-bile applications in cloud coniputing[C]//TntemationaI Conference onParallel Processing Workshops.Taipei:International Association ofComputing and Communication(IACC),2011.
  • 3Wen Jing L,Kui H.Security,privacy,and accountability in wireless ac-cess networks [J].IEEE Wireless Communications,2009,16(8).
  • 4Yi Ting L,Li Chun W,Rung Hung G.Implementation issues of loca-tion-based group scheduling for cloud applications[C]//IEEE VTS A-sia Pacific Wireless Communications SymposiumConference(APWCS2010).Taiwan:IEEE Computer Society,2010.
  • 5Ning Hui L,Tian Cheng L,Venkatasubramanian S.T-closeness:priva-cy beyond k-anonymity and 1-diversity [C]//International Conferenceon Data Enginering(ICDE).Istanbul:IEEE Press,2007:106-115.
  • 6Caimu T,Dapeng Oliver W.Mobile privacy in wireless networks-revisi-ted [J].IEEE Transactions On Wireless Communications,2008,7(3):1035-1042.
  • 7Mokhel M F,Chow C Y,Aref W G.The new oasper:a privacy-awarelocation-based database server[C]//Proceedings of the IEEE 23rd In-temational Conference on Data Engineering(ICDE).Istanbul:IEEEPress,2007:1499.
  • 8张毅,崔天喜,唐红.基于ECC组合公钥的GSM双向认证[J].计算机工程与应用,2008,44(19):109-111. 被引量:1
  • 9曾勇.一种基于非对称密钥密码体制的IMSI保护方案[J].通信技术,2008,41(9):152-154. 被引量:7
  • 10张国平,樊兴,唐明,张欣雨.面向LBS应用的隐私保护模型[J].华中科技大学学报(自然科学版),2010,38(9):45-49. 被引量:6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部