检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]Dept. of Computer Science and Engineering Shanghai Jiaotong University
出 处:《Journal of Harbin Institute of Technology(New Series)》2006年第4期404-408,共5页哈尔滨工业大学学报(英文版)
基 金:Sponsored by the National Natural Science Foundation of China (Grant No. 60203012).
摘 要:This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based uniform access framework, which combines different access methods into one unified model and provides more scalability and flexibility. Then an improved wireless authentication protocol is introduced into the framework, which gives an example of how unification is obtained by using public key technology. Since original protocol has flaws, an improved one is proposed based on security investigation. Improved authentication protocol overcomes the weakness of the original one, and maintains all the security features owned by old protocol. Finally, the feasibility of this framework is analyzed with consideration of current development in mobile telecommunication fields and the future trend of 3G systems. The result shows that public key technology has a promising future in 3G and Beyond 3G systems. It points out a new way for key management in future telecommunication systems.This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based uniform access framework, which combines different access methods into one unified model and provides more scalability and flexibility. Then an improved wireless authentication protocol is introduced into the framework, which gives an example of how unification is obtained by using public key technology. Since original protocol has flaws, an improved one is proposed based on security investigation. Improved authentication protocol overcomes the weakness of the original one, and maintains all the security features owned by old protocol. Finally, the feasibility of this framework is analyzed with consideration of current development in mobile telecommunication fields and the future trend of 3G systems. The result shows that public key technology has a promising future in 3G and Beyond 3G systems. It points out a new way for key management in future telecommunication systems.
关 键 词:3G telecommunication systems public Key cryptosystem network access
分 类 号:TN925[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63