A Study on User Authentication Mechanism in Mobile Network

碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 95 === Owing to the domestic Third Generation corporations established and popularized by the telecommunication services, the opportunities for consumers to use the telecommunication services with handset devices are increasing. Although consumers enjoy the conveni...

Full description

Bibliographic Details
Main Authors: Shin-Han Wu, 吳信翰
Other Authors: Horng-Twu Liaw
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/18109802492410541415
Description
Summary:碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 95 === Owing to the domestic Third Generation corporations established and popularized by the telecommunication services, the opportunities for consumers to use the telecommunication services with handset devices are increasing. Although consumers enjoy the convenience of telecommunication services, they simultaneously consider the invisible threat in mobile networks. In order to provide consumers with secure and convenient telecommunication services, authentication plays a very important role in the entire mobile network system, acting as the first defense against the attackers since it can ensure the correctness of the identities of communication entites before they engage in any other communication activities. First, the mobile server must authenticate the mobile user, so the authorized mobile user can access the relative services. On the other hand, the mobile user also must authenticate the mobile server to achieve the security of mutual authentication. Traditionally, using a registered password is used to achieve user identity authentication, but this means of authentication is not robust and secure enough. Consequently, this thesis argues for the use of key agreement to achieve confidentiality and integrity in communication. Because traditional key agreement uses the exponential calculation and the complex encryption algorithm, and based on the restrictions and insufficiency of the computational ability of mobile device, the thesis designs a user authentication protocol with fast and easy authentication and absolute security. The thesis also consider the situation that mobile users roam to VLR in different network domain without coming back to the registered HLR to apply for a certificate, the mobile user apply for the certificate with the former roaming VLR, thereby reducing the bandwidth consumption between VLR & HLR.