Abstract
Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to support the security functions. The proposed protocol significantly improves the performance of authentications and ensures the security of mobile communications in a large-scale communication network with multiple service providers.
Similar content being viewed by others
References
R. Atkinson, Security architecture for the Internet protocol, RFC-1825 (August 1995).
D. Balenson, Privacy enhancement for Internet electronic mail, Part III: Algorithms, modes, and identifiers, RFC-1423, SRI Network Information Center (February 1993).
K. Buchanan, R. Fudge, D. McFarlane, T. Phillips, A. Sasaki and H. Xia, IMT-2000: Service provider' perspective, IEEE Personal Communications Magazine 4(4) (1997) 8–13.
M. Burrows, M. Abadi and R. Needham, A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990) 18–36.
Cellular digital packet data system specification, Release 1.0, CDPD Consortium (July 1993).
Cellular intersystem operations (Rev. C), Technical Report IS-41, EIA/TIA (1995).
S. Chokhani, Toward a national public key infrastructure, IEEE Communications Magazine 32(9) (September 1994) 70–74.
Data encryption standard, NBS FIPS PUB 46-1, U.S. National Bureau of Standards, Department of Commerce (January 1977).
W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory (November 1976).
GSM 02.09: Security aspects, European Telecommunications Standards Institute (1993).
GSM 03.20: Security related network functions, European Telecommunications Standards Institute (June 1993).
Information processing systems – open systems interconnection – the directory – authentication framework, Recommendation X.509 and ISO 9594-8, CCITT Technical Report (1988).
R. Jain, Y.B. Lin and S. Mohan, A forwarding strategy to reduce network impacts of PCS, in: IEEE INFOCOM (1995), Vol. 2, pp. 481–489.
R. Jain, Y.B. Lin, C. Lo and S. Mohan, A caching strategy to reduce network impacts of PCS, IEEE Journal on Selected Areas in Communications 12(8) (October 1994) 1434–1444.
S. Kent, Privacy enhancement for Internet electronic mail, Part II: Certificate-based key management, RFC-1422, SRI Network Information Center (February 1993) 20–25.
B.Z. Kobb, Personal wireless, IEEE SPECTRUM (June 1993).
J. Linn, Privacy enhancement for Internet electronic mail, Part I: Message encryption and authentication procedures, RFC-1421, SRI Network Information Center (February 1993).
Y.B. Lin, Introduction to Mobile Network Management (Wei-Keg Publishing Co., 1997).
Mobile station-base station compatibility standard for dual-mode wideband spread spectrum cellular system, Technical Report TIA/EIA/IS-95-A, EIA/TIA (1995).
A.R. Modaressi and R.A. Skoog, Signalling system No. 7, A tutorial, IEEE Communications Magazine (July 1990) 19–35.
R. Molva, D. Samfat and G. Tsudik, Authentication of mobile users, IEEE Network 82 (March/April 1994) 26–34.
M. Mouly and M.B. Pautet, The GSM system for mobile communications, ISBN: 2-9507190-0-7 (1992).
C. Perkins, ed., IP mobility support, RFC 2002 (October 1996).
C. Perkins, Mobile-IP local registration with hierarchical foreign agents, IETF Internet-Draft (February 1996).
R.S. Sandhu and E.J. Coyne, Role-based access control models, IEEE Computer 292 (February 1996) 38–47.
R.L. Rivest, A. Shamir and L. Adelman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978) 120–126.
S.P. Shieh, C.T. Lin and J.T. Hsueh, Secure communication in global systems for mobile telecommunications, in: Proc. of 1st Workshop on Mobile Computing (1995) pp. 136–142.
Trusted computer system evaluation criteria, DoD STD-5200.28 (December 1985).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Lin, CT., Shieh, SP. Chain authentication in mobile communication systems. Telecommunication Systems 13, 213–240 (2000). https://doi.org/10.1023/A:1019144106761
Issue Date:
DOI: https://doi.org/10.1023/A:1019144106761