2006
DOI: 10.1016/j.cose.2005.11.001
|View full text |Cite
|
Sign up to set email alerts
|

An identity management protocol for Internet applications over 3G mobile networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…To establish mutual authentication while maintaining privacy, suggested security systems for 4G/5G networks must maintain location privacy, identity privacy, data integrity, and authenticity, as illustrated in Figure 6. Authors in [41], on the other hand, introduced the IDM3G protocol for ensuring mutual authentication and identity privacy in 3G. The IDM3G protocol is divided into two phases: (1) authentication of the UMTS Subscriber Identity Module (USIM) by the provision of a personal identification number, and (2) mutual authentication between the USIM and the mobile operator.…”
Section: Mutual Authentication With Privacymentioning
confidence: 99%
“…To establish mutual authentication while maintaining privacy, suggested security systems for 4G/5G networks must maintain location privacy, identity privacy, data integrity, and authenticity, as illustrated in Figure 6. Authors in [41], on the other hand, introduced the IDM3G protocol for ensuring mutual authentication and identity privacy in 3G. The IDM3G protocol is divided into two phases: (1) authentication of the UMTS Subscriber Identity Module (USIM) by the provision of a personal identification number, and (2) mutual authentication between the USIM and the mobile operator.…”
Section: Mutual Authentication With Privacymentioning
confidence: 99%
“…7. However, Dimitriadis and Polemi (2006) [111] proposed a protocol, named, IDM3G, to achieving the mutual authentication and identity privacy in 3G. The IDM3G protocol use two phases, namely, 1) the authentication of the UMTS Subscriber Identity Module (USIM) by providing a personal identification number and 2) the mutual authentication between the USIM and the mobile operator.…”
Section: B Mutual Authentication With Privacymentioning
confidence: 99%
“…Similar to the IDM3G protocol, Dimitriadis and Shaikh (2007) [112] proposed a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments. The BIO3G protocol cannot resist against the DoS attacks and the location and identity privacy are not considered compared to the IDM3G protocol [111]. He et al [74] proposed three categories of authentication scenarios for the 4G system.…”
Section: B Mutual Authentication With Privacymentioning
confidence: 99%
See 2 more Smart Citations