Authentication of Mobile Users in Third Generation Mobile Systems

  • Authors:
  • Zhi-Jia Tzeng;Wen-Guey Tzeng

  • Affiliations:
  • Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 30050, ROC E-mail: tzeng@cis.nctu.edu.tw;Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan 30050, ROC E-mail: tzeng@cis.nctu.edu.tw

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

The goal of the third-generation mobile systems is to provideworldwide operation, enhance service capabilities, andimprove performance over the second-generation mobile systems. Inthis paper, we propose an authentication procedure forthird-generation mobile systems. The authentication procedure is aprotocol suite consisting of two subprotocols: acertificate-based authentication (CBA) protocol and a ticket-basedauthentication (TBA) protocol. Only two parties, MS and VLR, areinvolved in executing our protocol. Our authentication procedureuses both public- and secret-key cryptosystems. Our authenticationprocedure not only provides uniform authentication across domains,but also reduces computational costs in the process of repeatedauthentication. We provide firm proof of our procedure'scorrectness.