Title :
A Secure Access Approach of UMTS Terminal Based on Trusted Computing
Author :
Yingyou, Wen ; Xuena, Peng ; Shuyi, Chen ; Hong, Zhao
Author_Institution :
Coll. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China
Abstract :
On the basis of comprehensive study of trusted computing technology and the threats to 3G network, a DAA-based key management and a trusted computing based access mechanism for 3G network are proposed, furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user privacy is protected and the bottleneck problem of centralized CA is avoided. The proposed MTM-based trusted access mechanism focuses on not only the authentication of mobile user, but also the healthy status of the mobile user. Therefore, the UMTS network can forbid the unsafe mobile terminals from accessing it, which guarantees the security of the network from the source. The validity of trusted UMTS access scheme is verified with the proposed formal analysis method.
Keywords :
3G mobile communication; authorisation; message authentication; telecommunication computing; telecommunication network management; telecommunication security; 3G network; DAA-based key management; MTM-based trusted access mechanism; UMTS terminal network; direct anonymous attestation; mobile user authentication; predicate logic based formal analysis method; secure access approach; trusted computing technology; user privacy; 3G mobile communication; Access control; Authentication; Computer architecture; Computer network management; Computer networks; Identity management systems; Information security; Mobile computing; Protection; MTM; TNC; UMTS; direct anonymous attestation; trusted computing;
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
DOI :
10.1109/NSWCTC.2010.176