Title :
Authentication protocols for mobile network environment value-added services
Author :
Horn, Günther ; Martin, Keith M. ; Mitchell, Chris J.
Author_Institution :
Corporate Technol., Siemens AG, Munchen, Germany
fDate :
3/1/2002 12:00:00 AM
Abstract :
The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications for such services continue to grow. This paper is concerned with the design of public key based protocols suitable for application in upcoming third-generation mobile systems such as the Universal Mobile Telecommunications Service. Candidate protocols are considered for the authentication of a mobile user to a value-added service provider with initialization of a mechanism enabling payment for the value-added service. A set of goals for such a protocol are identified, as are a number of generic attacks; these goals and attacks are then used to evaluate the suitability of seven candidate third-generation user-to-network authentication protocols. Many of these candidate protocols are shown to have highly undesirable features
Keywords :
land mobile radio; message authentication; mobile computing; protocols; public key cryptography; radio networks; telecommunication security; Universal Mobile Telecommunications Service; authentication protocols; generic attacks; mobile network environment value-added services; public key based protocols; secure mobile computing; secure telecommunication services; service payment; third-generation mobile systems; value-added service provider; 3G mobile communication; Authentication; Cryptographic protocols; Data security; Information security; Mobile computing; Public key; Public key cryptography; Telecommunication computing; Telecommunication services;
Journal_Title :
Vehicular Technology, IEEE Transactions on