Overview of mobile communication network authentication
With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018096 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed. |
---|---|
ISSN: | 2096-109X |