A self-encryption mechanism for authentication of roaming and teleconference services

被引:69
作者
Hwang, KF [1 ]
Chang, CC
机构
[1] Natl Taichung Inst Technol, Dept Multimedia Design, Taichung 404, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
authentication; global mobility network; roaming; secure teleconference; symmetric cryptosystem;
D O I
10.1109/TWC.2003.809452
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a simple authentication technique for use in the global mobility network (GLOMONET) is proposed. This technique is based on the concept of distributed security management, i.e., the original security manager administrates the original authentication key (long-term secret key) acquired when a user makes contract with his home network,,while a temporary security manager is generated for a roaming user in the visited network that provides roaming services. The temporary security manager will take the place of the original security manager when the roaming user stays in the service area of the visited network. In the proposed authentication protocol for the regular communication phase, the procedures of the original security manager and the temporary security manager are the same except for introducing different parameters. Furthermore, the proposed technique not only reduces the number of transmissions during the authentication phase, but it also can decrease the complexity of mobile equipment. The idea behind the proposed technique is to introduce a simple mechanism which is called "self-encryption." In this paper, we also suggest that this mechanism can be easily adopted as the authentication function for the secure teleconference service.
引用
收藏
页码:400 / 407
页数:8
相关论文
共 13 条
[1]  
[Anonymous], ACM COMPUT COMMUN RE
[2]  
Basagni S, 2000, 2000 IEEE 51ST VEHICULAR TECHNOLOGY CONFERENCE, PROCEEDINGS, VOLS 1-3, P288, DOI 10.1109/VETECS.2000.851464
[3]   TECHNIQUES FOR PRIVACY AND AUTHENTICATION IN PERSONAL COMMUNICATION-SYSTEMS [J].
BROWN, D .
IEEE PERSONAL COMMUNICATIONS, 1995, 2 (04) :6-10
[4]   Extensions to an authentication technique proposed for the global mobility network [J].
Buttyán, L ;
Gbaguidi, C ;
Staamann, S ;
Wilhelm, W .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2000, 48 (03) :373-376
[5]  
DAEMEN J, RIJNDAEL BLOCK CIPHE
[6]   CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS [J].
HWANG, MS ;
YANG, WP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (02) :416-420
[7]   Dynamic participation in a secure conference scheme for mobile communications [J].
Hwang, MS .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1999, 48 (05) :1469-1474
[8]  
*ITUT, 1997, INT REC INT NETW CS2
[9]   Location-aware mobile applications based on directory services [J].
Maass H. .
Mobile Networks and Applications, 1998, 3 (2) :157-173
[10]   Adaptive hybrid clock discipline algorithm for the network time protocol [J].
Mills, DL .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1998, 6 (05) :505-514