Skip to main content
Log in

Chain authentication in mobile communication systems

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to support the security functions. The proposed protocol significantly improves the performance of authentications and ensures the security of mobile communications in a large-scale communication network with multiple service providers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. Atkinson, Security architecture for the Internet protocol, RFC-1825 (August 1995).

  2. D. Balenson, Privacy enhancement for Internet electronic mail, Part III: Algorithms, modes, and identifiers, RFC-1423, SRI Network Information Center (February 1993).

  3. K. Buchanan, R. Fudge, D. McFarlane, T. Phillips, A. Sasaki and H. Xia, IMT-2000: Service provider' perspective, IEEE Personal Communications Magazine 4(4) (1997) 8–13.

    Article  Google Scholar 

  4. M. Burrows, M. Abadi and R. Needham, A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990) 18–36.

    Article  Google Scholar 

  5. Cellular digital packet data system specification, Release 1.0, CDPD Consortium (July 1993).

  6. Cellular intersystem operations (Rev. C), Technical Report IS-41, EIA/TIA (1995).

  7. S. Chokhani, Toward a national public key infrastructure, IEEE Communications Magazine 32(9) (September 1994) 70–74.

    Article  Google Scholar 

  8. Data encryption standard, NBS FIPS PUB 46-1, U.S. National Bureau of Standards, Department of Commerce (January 1977).

  9. W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory (November 1976).

  10. GSM 02.09: Security aspects, European Telecommunications Standards Institute (1993).

  11. GSM 03.20: Security related network functions, European Telecommunications Standards Institute (June 1993).

  12. Information processing systems – open systems interconnection – the directory – authentication framework, Recommendation X.509 and ISO 9594-8, CCITT Technical Report (1988).

  13. R. Jain, Y.B. Lin and S. Mohan, A forwarding strategy to reduce network impacts of PCS, in: IEEE INFOCOM (1995), Vol. 2, pp. 481–489.

    Google Scholar 

  14. R. Jain, Y.B. Lin, C. Lo and S. Mohan, A caching strategy to reduce network impacts of PCS, IEEE Journal on Selected Areas in Communications 12(8) (October 1994) 1434–1444.

    Article  Google Scholar 

  15. S. Kent, Privacy enhancement for Internet electronic mail, Part II: Certificate-based key management, RFC-1422, SRI Network Information Center (February 1993) 20–25.

    Google Scholar 

  16. B.Z. Kobb, Personal wireless, IEEE SPECTRUM (June 1993).

  17. J. Linn, Privacy enhancement for Internet electronic mail, Part I: Message encryption and authentication procedures, RFC-1421, SRI Network Information Center (February 1993).

  18. Y.B. Lin, Introduction to Mobile Network Management (Wei-Keg Publishing Co., 1997).

  19. Mobile station-base station compatibility standard for dual-mode wideband spread spectrum cellular system, Technical Report TIA/EIA/IS-95-A, EIA/TIA (1995).

  20. A.R. Modaressi and R.A. Skoog, Signalling system No. 7, A tutorial, IEEE Communications Magazine (July 1990) 19–35.

  21. R. Molva, D. Samfat and G. Tsudik, Authentication of mobile users, IEEE Network 82 (March/April 1994) 26–34.

  22. M. Mouly and M.B. Pautet, The GSM system for mobile communications, ISBN: 2-9507190-0-7 (1992).

  23. C. Perkins, ed., IP mobility support, RFC 2002 (October 1996).

  24. C. Perkins, Mobile-IP local registration with hierarchical foreign agents, IETF Internet-Draft (February 1996).

  25. R.S. Sandhu and E.J. Coyne, Role-based access control models, IEEE Computer 292 (February 1996) 38–47.

    Google Scholar 

  26. R.L. Rivest, A. Shamir and L. Adelman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978) 120–126.

    Article  Google Scholar 

  27. S.P. Shieh, C.T. Lin and J.T. Hsueh, Secure communication in global systems for mobile telecommunications, in: Proc. of 1st Workshop on Mobile Computing (1995) pp. 136–142.

  28. Trusted computer system evaluation criteria, DoD STD-5200.28 (December 1985).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, CT., Shieh, SP. Chain authentication in mobile communication systems. Telecommunication Systems 13, 213–240 (2000). https://doi.org/10.1023/A:1019144106761

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019144106761

Keywords

Navigation