透過您的圖書館登入
IP:3.145.152.98
  • 學位論文

有效率的第三代行動通訊認證方法之研究

A Study on Efficient Authentication Schemes for 3GPP

指導教授 : 李正吉 黃秀園
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著第三代行動通訊系統(3G)的普及,越來越多人享受著隨時隨地使用網路的生活型態。3G網路提供了即時傳訊、視訊會議、數位內容共享、多方連線遊戲等功能。在3G網路上的身分管理更是不該被忽視,而所謂3G網路身份管理就是在3G網路上管理使用者的識別身份和存取控制。其主要目的就是防止他人的不法冒用、預防個人資料的洩密以及防範各種的惡意攻擊。因此3G需要有一份健全的認證協議,這份協議必須架構於3G網路用戶與網路提供商之間,並且可使得兩者的驗證和授權訊息不會被第三者取得或攻擊。此外,由於VLR與HLR之間的訊息傳送成本較為昂貴,尤其是當VLR與HLR分別處於不同國家的時候。本研究方法是基於代理授權的方式,VLR只有首次進行認證時,須向HLR取得代理金鑰外。當用戶處於國外或是特定區域,VLR便能使用之前的代理金鑰自行與用戶端進行身分的認證,若用戶移動至其他新的VLR區域,接下來的認證只要向同一網路中,曾經拜訪過的VLR請求使用者的代理金鑰即可。

並列摘要


Along with the popularization of third generation mobile communication system (3G), more and more people enjoy the living type of using network at anywhere and anytime. The 3G network system provides the functions of real-time messages, multi-media conferencing, digital data sharing and interactive games. The identity management of 3G mobile network systems cannot to be neglected and the 3G mobile network system identity management, that it manages the identity and access control of users. The major purpose is to prevent the illegal user impersonate to service, prevent personal information stole and prevent any kind of attacks. Thus, the 3G needs an integrity authentication protocol and the protocol must be established between 3G network users and 3G network provider, which can resist the third party attack of the verify and authorize messages. Otherwise, the cost of the message communication between VLR and HLR are expensive, especially when VLR and HLR are located in different countries. Our proposed scheme is based on the agency scheme, and the VLR just need to ask HLR to get agency key at the first time. When a user in the foreign or specific area, VLR can uses the pre-agency key to authenticate the user, if the user moves to other new VLR area and the new VLR just need to ask pre-VLR to get the agency key in the same network.

參考文獻


[16] M. Zhang, and Y. Fang, “Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol,” IEEE Transactions on Wireless Communications, VOL. 4, NO. 2, PP. 734-742, March 2005.
[6] C. C. Lee, M. S. Hwang, and W. P. Yang, “Extension of Authentication Protocol for GSM,” IEE Proceedings- Communications, VOL. 150, No. 2, PP. 91-95, Apr. 2003.
[7] C. H. Lee, M. S. Hwang, and W. P. Yang, “Enhanced Privacy and Authentication for the Global System for Mobile Communications,” Wireless Networks, VOL. 5, PP. 231- 243, 1999.
[8] C. K. Dimitriadis, and D. Polemi, “An Identity Management Protocol for Internet Applications over 3G Mobile Networks,” Computers & Security, VOL. 25, Issue 1, PP. 45- 51, Feb. 2006.
[10] European Telecommunications Standards Institute (ETSI), GSM 02.09: Security Aspects, June 1993.

被引用紀錄


廖士儀(2009)。建構於Google Android手機之下一代行動教學平台研究與實作〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-1511201215465893

延伸閱讀