A Study of Key Distribution and Authentication for Mobile Communication

무선 통신에서의 키 분배 및 인증에 관한 연구

  • Park, Hui-Un (Dept.of Computer Science, Graduate School of Soonchungyang University) ;
  • Lee, Im-Yeong (Dept.of Information Technology Engineering, Soonchungyang University)
  • 박희운 (순천향대학교 대학원 전산학과) ;
  • 이임영 (순천향대학교 정보기술공학부)
  • Published : 2000.04.01

Abstract

Base on the development of mobile communication, the future mobile communication systems were expected to provide higher quality of multimedia services for users than today's systems. Therefore, many technical factors are needed in this systems. Especially these secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents weaknesses and propose required properties in mobile communication. Based on those proposed properties, we propose a new 'call set-up' and 'hand-off' protocol for authentication and key distribution. Also we compare between the proposed scheme and conventional schemes.

Keywords

References

  1. ETSI ETS GSMI 02.09. 'European Digital Cellular Telecommunications System(Phase 2); Security Aspects.' Version 4.2 4, September 1994
  2. ETSI ETS 3000175-7, 'DECT Common Interface, Part 7 . Security Features,' October 1992
  3. UMTS Forum. 'A regulatory framework for UMTS,' Report No.1, 1997
  4. ETSI ETR 33.20. 'Security Principles for the Universal Mobile Telecommunications System (UMTS).' Draft. 1 1997
  5. lTU, 'Security Prinerples for 'Future Public Land Mobile Telecommunication Systems,' Rec ITU-RM 1078
  6. G. Horn and B. Preneel, 'Authentication and Payment in Future Mobile Systems,' Proceedings ESORICS '98, LNCS 1485, .J- J. Quisquater. Y. Deswarte, C. Meadows, D. Gollmann, Eds, Springer-Verlag, pp.277-293, 1998 https://doi.org/10.1007/BFb0055870
  7. K. H. Lee, S. J. Moon, W. Y. Jeong and T. G. Kim, 'A 2-pass Authentication and Key Agreement Protocol for Mobile Communications,' Pre-Proceedings of ICISC '99, pp. 143- 155,1999 https://doi.org/10.1007/10719994_13
  8. JTC(air)/94 12.15-119Rc, 'Personal Communications Services,' PACS Air Interface Specification. PN3418
  9. Y Zhong. 'An. authentication and security protocol for mobile computing,' proceedings of IFIP, pp,249- 257, 1996
  10. S. J. Kim S. J. Park and D. H. Won, 'Nominative Signatures,' Proc. ICEIC '95, pp.lI-68-II-71, 1995