Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks

차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜

  • Jeong, Jong-Min (Dept. of Information and Telecommunications, Kangwon National University) ;
  • Lee, Goo-Yeon (Dept. of Information and Telecommunications, Kangwon National University) ;
  • Lee, Yong (Korea Certification Authority Central Korea Information Security Agency)
  • 정종민 (강원대학교 컴퓨터정보통신공학과) ;
  • 이구연 (강원대학교 전기전자정보통신공학부) ;
  • 이용 (한국정보보호진흥원 전자서명인증관리센터)
  • Published : 2003.04.01

Abstract

In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

개인 서비스 환경의 이동성과 전역 로밍을 위해 제안된 VHE(virtual home environment) 구조에서 가입자는 홈 망에서와 동일한 서비스를 방문 망에서도 제공받을 수 있게 된다. 가입자에게 서비스 이동성을 제공하기 위해서는 홈 망에 보관되어 있는 사용자 데이터와 서비스 로직이 방문 망으로 전달되어야 한다. 이 경우 사용자 프로파일과 서비스 로직은 보안에 민감한 정보를 포함하고 있으므로 통신의 신뢰성을 유지하기 위해서 모든 엔티티 사이의 상호 인증 절차가 요구된다. 이를 위해 본 논문에서 3G/4G 망의 VHE에 적용 가능한 3자간의 상호 인증 절차를 제안하고 분석한다.

Keywords

References

  1. '3rd Generation Partnership Project: The Vutual Horre Environment (3G TS22.121 Ver 3.1.0)', 3GPP Technical Spec., 1999
  2. 'Network functional model for IMT2000', ITU-T Recommendation Q.l711, Mach 1999
  3. M. Torabi, Rolfe E.Buhrke, 'Third Generation Mobile Telecommunications and Virtual Home Environment', Bell Lab Tech. Journal, 1998 https://doi.org/10.1002/bltj.2115
  4. M. Torabi, 'A Shift in the Mobile Network Service Provisioning Paradigm', Bell Lab Tech. Journal, 2000 https://doi.org/10.1002/bltj.2239
  5. J. Hartmann, C. Gorg, P. Farjami, 'Agent Technology for the UMTS VHE Concept', ACM/IEEE MobiCom'98, Workshop on Wireless Mobile Multimedia, Dallas, United States, October 1998 https://doi.org/10.1145/288338.288374
  6. R. Joos, A. Tripathi, 'Mutual Authentication in Wireless Network', Technical Report, Department of Computer Science, University of Minnesota, June 4, 1997
  7. C. Boyd, D. G. Park, 'Public Key Protocols for WIreless Comrmmications', Proceedings of ICISC; 98, pp. 47 -57, 1998
  8. A. Aziz, W. Diffie, 'Privacy and Authentication for WIreless Local Area Network', IEEE Personal Commnunications, Vol. 1, pp. 25-31, 1994 https://doi.org/10.1109/98.295357
  9. Y. Mu, V. Varadhrarajan, 'On the Design of Security Protocols for Mobile Commmications', ACISP'96 Conference, Pringer-Verlang, pp. 134 -146, 1996
  10. '3rd Generation Partnership Project: General Report on the Design, Specification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms', 3GPP Technical Spec., 2000