Indexed by:
Abstract:
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don't offer user's end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates many security applications. The linchpin of end-to-end encryption is how to efficiently manage every key. A novel key management scheme is presented in this paper, fully using the speciality of 3 G, which bases on three-party Diffie-Hellman key negotiation algorithm. It almost needs no modifications of the structure of 3 G except that new software is added. Because the scheme needs no extra shared secret, it reduces the key storage of User Equipments (UE) and Authentication Centre to O(1). In addition, the troubles of the preassignment of shared secret and key update are omitted, and the mutual authentication and the lawful interception are provided.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2009
Language: English
Cited Count:
SCOPUS Cited Count: 1
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 1