A Secure Access Approach of UMTS Terminal Based on Trusted Computing

  • Authors:
  • Wen Yingyou;Peng Xuena;Chen Shuyi;Zhao Hong

  • Affiliations:
  • -;-;-;-

  • Venue:
  • NSWCTC '10 Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

On the basis of comprehensive study of trusted computing technology and the threats to 3G network, a DAAbased key management and a trusted computing based access mechanism for 3G network are proposed, furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user privacy is protected and the bottleneck problem of centralized CA is avoided. The proposed MTM-based trusted access mechanism focuses on not only the authentication of mobile user, but also the healthy status of the mobile user. Therefore, the UMTS network can forbid the unsafe mobile terminals from accessing it, which guarantees the security of the network from the source. The validity of trusted UMTS access scheme is verified with the proposed formal analysis method.