Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005.
DOI: 10.1109/icccas.2005.1493433
|View full text |Cite
|
Sign up to set email alerts
|

Security scheme for 4G wireless systems

Abstract: Abstmct-4Gmobile communication systems focus on seamtessly integrating the existing wireless technologies and providing great flexibility and mobility which complex the sccurity problem in turn. In this paper security policy including authentication, authorization, account and audit (AAAA) is discusscd according to the features of 4G systems. Meanwhile the security architecture scenario based on hybrid PKI trust model and mobile IPv6 is proposed. Over this architecture a novel hybrid authentication and key agr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…In spite of many researchers (Chen, Jan, & Chen, 2005;Ren, Lou, Kim, & Deng, 2006;Zheng, He, Xu, & Tang, 2005) have proposed the lightweight authentication protocols, we need to integrate the related mechanisms and propose a suitable mobile E-DRM protocol. The classic E-DRM system should limit the access digital content for those who can not passed the authorization authentication.…”
Section: The Current Drm Developmentmentioning
confidence: 99%
“…In spite of many researchers (Chen, Jan, & Chen, 2005;Ren, Lou, Kim, & Deng, 2006;Zheng, He, Xu, & Tang, 2005) have proposed the lightweight authentication protocols, we need to integrate the related mechanisms and propose a suitable mobile E-DRM protocol. The classic E-DRM system should limit the access digital content for those who can not passed the authorization authentication.…”
Section: The Current Drm Developmentmentioning
confidence: 99%
“…Security policy issues such as the use of lightweight and flexible AAAA (Authentication, Authorization, Account, Audit) schemes, the use of Trusted Computing (Zheng, 2005b), and the use of different security polices for different services are recommended for 4G systems (Zheng et al, 2005a). Integration of the SSL security protocol and a Public Key Infrastructure is outlined and evaluated in (Kambourakis et al, 2004).…”
Section: Security Architecturementioning
confidence: 99%
“…Zheng et al [109] present a hybrid PKI trust authentication scheme that also provides a non-repudiation service. It employs public key infrastructure (PKI) and combines it with the dynamic password scheme.…”
Section: Two-party Authentication Schemesmentioning
confidence: 99%