Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (5): 371-378    DOI: 10.1631/jzus.C1000194
    
A three-level authenticated conference key establishment protocol for UMTS networks
Chung-Fu Lu1,2, Tzong-Chen Wu1, Chien-Lung Hsu*,3
1 Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei 2 Department of Computer and Communication Engineering, Taipei College of Maritime Technology, Taiwan 111, Taipei 3 Department of Information Management, Chang Gung University, Taiwan 333, Taoyuan
A three-level authenticated conference key establishment protocol for UMTS networks
Chung-Fu Lu1,2, Tzong-Chen Wu1, Chien-Lung Hsu*,3
1 Department of Information Management, National Taiwan University of Science and Technology, Taiwan 106, Taipei 2 Department of Computer and Communication Engineering, Taipei College of Maritime Technology, Taiwan 111, Taipei 3 Department of Information Management, Chang Gung University, Taiwan 333, Taoyuan
 全文: PDF(207 KB)  
摘要: A conference key establishment protocol allows a group of conferees to agree on a secret key shared among them for secure group communication. This paper proposes a three-level conference key establishment protocol based on the Universal Mobile Telecommunications System (UMTS) framework to establish a group-level key, home location register (HLR) level keys, and visitor location register (VLR) level keys simultaneously for a group of conferees. The group-level key is used to secure the communications for all conferees, the HLR-level key is for those within the same HLR domain, and the VLR-level key is for those within the same VLR domain. The group-level key can be used for securing inter-domain group-oriented applications such as commercial remote conferencing systems. The HLR- and VLR-level keys can be used for securing intra-domain subgroup applications (e.g., location-based or context-aware services) and dynamic key updating. Since our proposed protocol exploits existing UMTS security functions and the exclusive-or operation, it is compatible with UMTS architecture. This means that it is fast and easy to implement on the existing UMTS architecture. Furthermore, the proposed protocol has low computational complexities and can provide cost effectiveness, load-amortization, scalability, user authentication, key establishment, key confirmation, key updating, and lawful interception.
关键词: Universal Mobile Telecommunications System (UMTS)Three-levelConference key establishmentSecure group communicationAuthentication    
Abstract: A conference key establishment protocol allows a group of conferees to agree on a secret key shared among them for secure group communication. This paper proposes a three-level conference key establishment protocol based on the Universal Mobile Telecommunications System (UMTS) framework to establish a group-level key, home location register (HLR) level keys, and visitor location register (VLR) level keys simultaneously for a group of conferees. The group-level key is used to secure the communications for all conferees, the HLR-level key is for those within the same HLR domain, and the VLR-level key is for those within the same VLR domain. The group-level key can be used for securing inter-domain group-oriented applications such as commercial remote conferencing systems. The HLR- and VLR-level keys can be used for securing intra-domain subgroup applications (e.g., location-based or context-aware services) and dynamic key updating. Since our proposed protocol exploits existing UMTS security functions and the exclusive-or operation, it is compatible with UMTS architecture. This means that it is fast and easy to implement on the existing UMTS architecture. Furthermore, the proposed protocol has low computational complexities and can provide cost effectiveness, load-amortization, scalability, user authentication, key establishment, key confirmation, key updating, and lawful interception.
Key words: Universal Mobile Telecommunications System (UMTS)    Three-level    Conference key establishment    Secure group communication    Authentication
收稿日期: 2010-06-13 出版日期: 2011-05-09
CLC:  TP309  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Chung-Fu Lu
Tzong-Chen Wu
Chien-Lung Hsu

引用本文:

Chung-Fu Lu, Tzong-Chen Wu, Chien-Lung Hsu. A three-level authenticated conference key establishment protocol for UMTS networks. Front. Inform. Technol. Electron. Eng., 2011, 12(5): 371-378.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C1000194        http://www.zjujournals.com/xueshu/fitee/CN/Y2011/V12/I5/371

[1] Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh. Efficient and secure three-party authenticated key exchange protocol for mobile environments[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(5): 347-355.
[2] Kuo-Hui Yeh, Kuo-Yu Tsai, Jia-Li Hou. Analysis and design of a smart card based authentication protocol[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(12): 909-917.
[3] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.
[4] Rong FAN, Dao-jing HE, Xue-zeng PAN, Ling-di PING. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks[J]. Front. Inform. Technol. Electron. Eng., 2011, 12(7): 550-560.
[5] Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.
[6] Horng-Twu Liaw, Chih-Ta Yen, Meng-Yu Chiu, Li-Lin Hsiao. Efficient password authentication schemes based on a geometric approach for a multi-server environment[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(12): 989-997.