User Authentication Schemes for Mobile Communications

碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 89 === Today, mobile communication is widespread in the world and its technologies have undergone rapid development. It brings convenience to people in their daily life, such that each user can communicate and transfer data w...

Full description

Bibliographic Details
Main Authors: Cheng-Chi Lee, 李正吉
Other Authors: Min-Shiang Hwang
Format: Others
Language:en_US
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/08617463212772249246
Description
Summary:碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 89 === Today, mobile communication is widespread in the world and its technologies have undergone rapid development. It brings convenience to people in their daily life, such that each user can communicate and transfer data with others at any place, at any time. Despite the convenience of mobile communication, an important issue, the security of communication, has drawn the attention of researchers and manufactures. There are two major security requirements, privacy and authentication, in mobile communications. Privacy involves ensuring that an eavesdropper cannot intercept the communications information of mobile users. Authentication involves ensuring that the services are not obtained fraudulently. However, to meet the rapidly evolution of mobile communications, higher different security requirements are essential for different mobile communication systems. In this study, without losing the two major security requirements, we first discuss the characteristics and requirements for four user authentication schemes of mobile communications: an efficient Global System for Mobile communication (GSM) authentication scheme, certificate-based scheme, subscriber anonymity scheme, and a flexible scheme. To achieve this study, we then introduce related theories and schemes. Afterward, we anticipate utilizing them and cryptography to propose our secure and efficient user authentication schemes in the four subjects. First subject, we propose a new authentication protocol for GSM networks, which is able not only to reduce the network traffic, but also to reduce mobile station power consumption. Moreover, this protocol is highly secure. We also give a comparison between the recently proposed GSM authentication protocols. Second subject, we propose a certificate-based authentication scheme in mobile communications. This scheme can withstand the replaying attack and achieve perfect forward secrecy and key authentication. Third subject, we propose an authentication scheme to achieve anonymity and non-repudiation between mobile users and HLR in personal communication systems. Last subject, we propose a new remote user authentication scheme. This scheme can achieve five goals: (1)it does not require password or verification tables. (2)password should not be exposed during the process of authentication. (3)it can withstand the message replay attack. (4)any legal user can freely choose and change his/her own password at will. (5)the password of users is not known to server.