首页> 外文期刊>Concurrency and computation: practice and experience >A formal analysis of authentication protocols for mobile devices in next generation networks
【24h】

A formal analysis of authentication protocols for mobile devices in next generation networks

机译:下一代网络中移动设备认证协议的形式分析

获取原文
获取原文并翻译 | 示例

摘要

Next Generation Networks comprise a wide variety of access technologies such as 2G/3G, WLAN as well asrnthe Long-Term Evolution (LTE) networks. In this environment, mobile devices are expected to store sensitiverndata and represent users to access the underlying networks and connect to a wide variety of sensitive servers.rnIt is crucial, in this sense, for end users to trust their mobile devices and for all transactions using themrnto be secure. Therefore, a number of communication frameworks in Next Generation Networks have beenrnworking on designing device authentication protocols that achieve mutual authentication between users andrnmobile terminals. This paper analyses some of these protocols and introduces two new device authenticationrnprotocols, verifies them using formal methods approach and discusses how they achieved desired securityrnproprieties. The performance analysis highlights another advantage of the proposed protocols.
机译:下一代网络包括各种各样的接入技术,例如2G / 3G,WLAN以及长期演进(LTE)网络。在这种环境下,预计移动设备将存储敏感数据并代表用户访问底层网络并连接到各种敏感服务器。从这个意义上讲,对于最终用户而言,信任他们的移动设备以及使用他们是安全的。因此,下一代网络中的许多通信框架一直在设计用于实现用户与移动终端之间的相互认证的设备认证协议。本文分析了其中一些协议,并介绍了两个新的设备身份验证协议,使用形式化方法对它们进行了验证,并讨论了它们如何实现所需的安全性。性能分析突出了所提出协议的另一个优点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号