Security scheme for 4G wireless systems

4G mobile communication systems focus on seamlessly integrating the existing wireless technologies and providing great flexibility and mobility which complicate the security problem. In this paper the security policy including authentication authorization account and audit (AAAA) is discussed according to the features of 4G systems. Meanwhile the security architecture scenario based on hybrid PKI trust model and Mobile IPv6 is proposed. Over this architecture a novel hybrid authentication and key agreement scheme that associates dynamic password with public-key mechanism is presented to provide lightweight authentication and non-repudiation service. Compared with other architectures and protocols, our scheme is more flexible and convenient to support global mobility with low computational power and secure communication. So it is very suitable for 4C mobile communication systems.

[1]  Vangelis Gazis,et al.  Generic system architecture for 4G mobile communications , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[2]  HuiSuk Yu,et al.  Challenges in the migration to 4G mobile systems , 2003 .

[3]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[4]  Ed Dawson,et al.  Privacy and trusted computing , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[5]  Kiho Kim,et al.  Beyond 3G: vision, requirements, and enabling technologies , 2003, IEEE Commun. Mag..

[6]  Alexandru Petrescu,et al.  Network mobility in beyond-3G systems , 2003, IEEE Commun. Mag..

[7]  Kwangjo Kim,et al.  Authentication and payment protocol preserving location privacy in mobile IP , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[8]  Roy H. Campbell,et al.  A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2002, IEEE Wirel. Commun..

[9]  Joachim Sachs,et al.  Ambient networks: an architecture for communication networks beyond 3G , 2004, IEEE Wireless Communications.

[10]  C. Perkins,et al.  Mobile IP and security issue: an overview , 1999, First IEEE/POPOV Workshop on Internet Technologies and Services. Proceedings (Cat. No.99EX391).

[11]  Dooho Choi,et al.  Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[12]  Kwok-Yan Lam,et al.  Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[13]  C. Admas,et al.  Profiles and protocols for the Internet Public-Key Infrastructure , 1997, Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems.

[14]  W. W. Lu,et al.  Open wireless architecture - the core to 4G mobile communications , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[15]  S. Hui Challenges in the Migration to 4 G Mobile Systems , 2022 .

[16]  Matu-Tarow Noda,et al.  Simple and Secure Password Authentication Protocol (SAS) , 2000 .

[17]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[18]  Yasushi Yamao,et al.  Architecture and Mobile IPv6 extensions supporting mobile networks in mobile communications , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[19]  Narumi Yokohama-shi Umeda,et al.  Radio access network design concept for the fourth generation mobile communication system , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[20]  HanZhen,et al.  Hierarchy-distribution combined PKI trust model , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[21]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[22]  William T. Polk,et al.  Public Key Infrastructures that Satisfy Security Goals , 2003, IEEE Internet Comput..

[23]  Hirohito Inagaki,et al.  A Password Authentication Method for Contents Communications on the Internet , 1998 .

[24]  Alan Kai-Hau Yeung,et al.  Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..