2008 International Symposium on Biometrics and Security Technologies 2008
DOI: 10.1109/isbast.2008.4547638
|View full text |Cite
|
Sign up to set email alerts
|

User authentication scheme based on self-certified public-key for next generation wireless network

Abstract: The developing next generation (4G) mobile communication system will offer us great convenience and huge opportunities of service creation with numerous security threats. As a critical security mechanism, user authentication and key agreement (AKA) schemes have received considerable attentions in recent years. In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the coming 4G system to reduce the storage, computation and communicational load of existing public-key based user a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…Since 4G wireless networks will be connected via IP (Internet Protocol) based bone networks, the unprotected link among the wired parties in 4G systems will suffer from many existing attacks from the Internet. In some cases, the system will leak user's IMSI (international mobile subscriber identity) in clear text over air interface causing user to suffer from illegal tracing risk [44]. Careful design and selection of authentication protocol can serve as security mechanism in 4G network scenarios.…”
Section: Perspectives Of Managing Mobile Service Security Risksmentioning
confidence: 99%
See 1 more Smart Citation
“…Since 4G wireless networks will be connected via IP (Internet Protocol) based bone networks, the unprotected link among the wired parties in 4G systems will suffer from many existing attacks from the Internet. In some cases, the system will leak user's IMSI (international mobile subscriber identity) in clear text over air interface causing user to suffer from illegal tracing risk [44]. Careful design and selection of authentication protocol can serve as security mechanism in 4G network scenarios.…”
Section: Perspectives Of Managing Mobile Service Security Risksmentioning
confidence: 99%
“…The protocol offers mutual authentication through a challenge-response algorithm that occurs between the SIM card and the authentication service [14]. SPAKA scheme is one of the proposed schemes and is a self-certified public-key based AKA to offer fast access, flexibility, scalability, and nonrepudiation proof for 4G systems by categorizing authentication scenarios into registration authentication (first time registration) and call authentication (handoff process) [44]. Many 4G services are delayed sensitive.…”
Section: Perspectives Of Managing Mobile Service Security Risksmentioning
confidence: 99%
“…For the openness of the radio channels and randomness of the user's mobility, the security of mobile communication system has considered as one of the most challenging problems [1]. As a critical security mechanism, the authentication and key agreement protocol has received considerable attention since its introduction into mobile communication system.…”
Section: Introductionmentioning
confidence: 99%