Overview of mobile communication network authentication

With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue...

Full description

Saved in:
Bibliographic Details
Main Authors: Xinxin HU, Caixia LIU, Shuxin LIU, Wei YOU, Kang QIAO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018096
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530067411271680
author Xinxin HU
Caixia LIU
Shuxin LIU
Wei YOU
Kang QIAO
author_facet Xinxin HU
Caixia LIU
Shuxin LIU
Wei YOU
Kang QIAO
author_sort Xinxin HU
collection DOAJ
description With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed.
format Article
id doaj-art-87d7f5c6974b48c88632f86da45843ed
institution Kabale University
issn 2096-109X
language English
publishDate 2018-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-87d7f5c6974b48c88632f86da45843ed2025-01-15T03:13:14ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-12-01411559554969Overview of mobile communication network authenticationXinxin HUCaixia LIUShuxin LIUWei YOUKang QIAOWith the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018096mobile networkauthenticationsecurity5G mobile communicationunified authentication
spellingShingle Xinxin HU
Caixia LIU
Shuxin LIU
Wei YOU
Kang QIAO
Overview of mobile communication network authentication
网络与信息安全学报
mobile network
authentication
security
5G mobile communication
unified authentication
title Overview of mobile communication network authentication
title_full Overview of mobile communication network authentication
title_fullStr Overview of mobile communication network authentication
title_full_unstemmed Overview of mobile communication network authentication
title_short Overview of mobile communication network authentication
title_sort overview of mobile communication network authentication
topic mobile network
authentication
security
5G mobile communication
unified authentication
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018096
work_keys_str_mv AT xinxinhu overviewofmobilecommunicationnetworkauthentication
AT caixialiu overviewofmobilecommunicationnetworkauthentication
AT shuxinliu overviewofmobilecommunicationnetworkauthentication
AT weiyou overviewofmobilecommunicationnetworkauthentication
AT kangqiao overviewofmobilecommunicationnetworkauthentication