期刊文献+

基于证书有效性凭据的UMTS认证和密钥协商协议 被引量:1

UMTS Authentication and Key Agreement Protocol Based on Certificate Validity Ticket
原文传递
导出
摘要 提出了一种混合采用对称密码加密和公钥密码认证的第3代移动通信系统认证和密钥协商(UMTS AKA)协议。在该协议中,归属网络负责在线验证拜访网络公钥证书的有效性,然后生成一个简短的安全凭据,拜访网络通过向移动设备(ME)出示该凭据证实自己的身份,ME无需在线接收并验证拜访网络的公钥证书即可确认其身份,从而降低了ME的通信传输和计算开销。实现了拜访网络与归属网络之间的身份认证和消息安全传输,提高了UMTS AKA全过程的安全性。采用BAN逻辑证明了协议的安全性。与SPAKA协议和Lee方案的对比分析表明,所提出的协议效率更高。 In this paper,a novel authentication and key agreement protocol for UMTS named PKCB-AKA is proposed.In the protocol,home network validates the validity of the certificate of visiting network,and then generates a short secure ticket.Visiting network proves its identity by providing this ticket to mobile equipment(ME).By this way,ME is able to verify VLR's identity without receiving and validating the certificate of visiting network online,thus reduces the communicating and computing cost.PKCB-AKA achieves the security goals of authentication and wireless communication.BAN logic is employed to prove the security feature of PKCB-AKA.Comparative analyses indicate that PKCB-AKA is more efficient than both SPAKA Protocol and the Lee's scheme.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2012年第9期129-134,共6页 Journal of Wuhan University of Technology
基金 国家"863"计划(2009AA01Z437) 国家自然科学基金(61100042)
关键词 UMTS安全 认证 密钥协商 无线安全 第3代移动通信 UMTS security authentication key agreement wireless security 3G
  • 相关文献

参考文献14

  • 1Niemi V,Nyberg K.UMTS Security[M].Chichester:John Wiley&Sons,2003.
  • 2Zhang M,Fang Y.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol[J].IEEETransactions on Wireless Communications,2005,4(2):734-742.
  • 33GPP.3GPP TS 33.102V7.1.0[EB/OL].[2012-06-12].http://www.3gpp.org/ftp/Specs/archive/33-series/33.102/33102-710.zip.
  • 4Ou H H,Lin I C,Hwang M S.TK-AKA:Using Temporary Key on Authentication and Key Agreement Protocol onUMTS[J].International Journal of Network Management,2009,19:291-303.
  • 5Ou H H,Hwang M S,Jan J K.A Cocktail Protocol with the Authentication and Key Agreement on the UMTS[J].TheJournal of Systems and Software,2010,83:316-325.
  • 6Newe T,Coffey T.Security Protocols for 2Gand 3G Wireless Communications[C] //Proceedings of the 1st InternationalSymposium on Information and Communication Technologies.Dublin:[s.n.] ,2003:335-340.
  • 7El-fishway N,Tadros A.On the Design of Authentication Protocols for Third Generation Mobile Communication Sys-tems[C] //Proceedings of the 20th National Radio Science Conference.Cairo:[s.n.] ,2003:C24_1-C24_10.
  • 8郑宇,何大可,梅其祥.基于自验证公钥的3G移动通信系统认证方案[J].计算机学报,2005,28(8):1327-1332. 被引量:13
  • 9He D K,Wang J B,Zheng Y.User Authentication Scheme Based on Self-certified Public-key for Next Generation Wire-less Network[C] //Proceedings of the International Symposium on Biometrics and Security Technologies.Islama-bad:[s.n.] ,2008:1-8.
  • 10余斌宵.无线网络的安全性——理论、技术与方法[D].西安:西安电子科技大学.2005.

二级参考文献14

  • 1van Oorschort P.C., Wiener M.J.. On Diffie-Hellman key agreement with short exponents. In: Proceedings of Eurocrypt'1996, Zaragoza, Spain, 1996, 332~343.
  • 2Best P., Kamesh Namuduri, Pendse R.. Quantitative analysis of security protocols in wireless network. In: Proceedings of Workshop of Information Assurance, USA, 2003, 290~291.
  • 33GPP TS33.102: 3G security architecture.
  • 43GPP TS33.103: Integration guidelines.
  • 53GPP TS33.133: Security threats and requirements.
  • 6Min L., Hai Bi, Zhengjin F.. Security architecture and mechanism of third generation mobile communication. In: Proceedings of IEEE Conference on Computers, Communications, Control and Power Engineering, Beijing, China, 2002, 813~816.
  • 7Kambourakis Georgios, Rouskas Angelos. Performance evaluation of public key-based Authentication in future mobile communication systems. EURASIP Journal on Wireless Comm. and Networking, 2004, 1(1): 184~197.
  • 8Lin Yi-Bing, Chen Yuan-Kai. Reducing authentication signaling traffic in third-generation mobile network. IEEE Transactions on Wireless Communications, 2003, 2(3): 493~501.
  • 9Beller M.J., Chang L.F., Yacobi Y.. Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications, 1993, 11(6): 821~829.
  • 10Putz S., Schmitz R., Tonsing F.. Authentication schemes for third generation mobile radio systems. In: Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Boston, 1998, 126~130.

共引文献12

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部