• Title/Summary/Keyword: Subscriber's agreement

Search Result 5, Processing Time 0.023 seconds

A UMTS Key Agreement Protocol Providing Privacy and Perfect Forward Secrecy (프라이버시와 완전한 전방향 안전성을 제공하는 UMTS 키 동의 프로토콜)

  • Kim, Dae-Young;Cui, Yong-Gang;Kim, Sana-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.81-90
    • /
    • 2007
  • In the UMTS (Universal Mobile Telecommunication System), which is one of 3G mobile communication standards, the protocol called UMTS AKA (Authentication and Key Agreement) is used to authenticate mobile stations. However, the UMTS AKA protocol has some weakness, including network bandwidth consumption between a SN (Serving Network) and a HN (Home Network) and SQN (SeQuence Number) synchronization. In this paper, we propose a new improved protocol for UMTS that overcomes UMTS AKA weakness. Our protocol solves the privacy problem caused by IMSI (International Mobile Subscriber Identity)'s disclosure and provides perfect forward secrecy using ECDH (Elliptic Curve Diffie Hellman).

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.

Review of Allowable Condition of the Discretionary not Covered Service (임의비급여 허용요건에 관한 검토)

  • Park, Tae-Shin
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.2
    • /
    • pp.11-38
    • /
    • 2012
  • The Supreme Court stand in the position in specific lawsuit that it doesn't allow the discretionary not covered service, but recently in revocation suit of fine disposal that is imposed on medical fee of leukemia patient, it altered the existing adjudgement and admitted the discretionary not covered service exceptionally. It put forward the allowable condition roughly in that case. According as this alteration, it has become more important to embody the allowance conditions of exceptions. The Supreme Court presented three things, which are procedural condition, medical condition and subscriber's agreement. Concerning procedural condition, several present conciliation procedures are as follows: medical care benefit arret request, relative value conciliation etc, prior request on anti-cancer drug among chemicals which exceed acceptance criteria, request of non benefit object on common drugs. To be granted the existence of those system, there should be no obstacle to use that. Even if it were so, we should take circumstances into consideration; individual situation is unescapable concerning substance and urgency of the discretionary not covered service, process of the procedure, time required etc. Regarding medical condition, safety and effectiveness will be verified through evaluation procedures of new medical skill. About the necessity, the Supreme Court made clear through a sentence that it allow the discretionary not covered service, in case that needs to treat a patient out of the standard of medical benefit. Strict interpretation is right and it answer the purpose of the sentence that the supreme court permit the discretionary not covered service, exceptionally. We need to differentiate medical necessity and medical validity. Subscriber's agreement should holds true if it entails full explanation, and if it is preliminary, explicit and individual. On this account, it should be difficult to admit that someone agree effectively when he call for the affirmation that he is recipient of medical care. Reasonable expense needs to be a part of review whether the agreement is valid. Meanwhile If we adjust system of medical expense and eventually reorganize a fee for consultation payment system (Fee-for-service controlled by item to DRG (Diagnosis Related Groups)), controversial area of the discretionary not covered service will be decreased and that will guarantee the discretion of the doctor.

  • PDF

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

Evaluation of Authentication Signaling Load in 3GPP LTE/SAE Networks (3GPP LTE/SAE 네트워크에서의 인증 시그널링 부하에 대한 평가)

  • Kang, Seong-Yong;Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.213-224
    • /
    • 2012
  • The integrated core network architecture and various mobile subscriber behavior can result in a significant increase of signaling load inside the evolved packet core network proposed by 3GPP in Release 8. Consequently, an authentication signaling analysis can provide insights into reducing the authentication signaling loads and latency, satisfying the quality-of-experience. In this paper, we evaluate the signaling loads in the EPS architecture via analytical modeling based on the renewal process theory. The renewal process theory works well, irrespective of a specific random process (i.e. Poisson). This paper considers various subscribers patterns in terms of call arrival rate, mobility, subscriber's preference and operational policy. Numerical results are illustrated to show the interactions between the parameters and the performance metrics. The sensitivity of vertical handover performance and the effects of heavy-tail process are also discussed.