By Topic

Novel key management for 3G end-to-end encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Jian Wang ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Nan Jiang ; Hui Li ; Xinxin Niu
more authors

People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don't offer user's end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates many security applications. The linchpin of end-to-end encryption is how to efficiently manage every key. A novel key management scheme is presented in this paper, fully using the speciality of 3G, which bases on three-party Diffie-Hellman key negotiation algorithm. It almost needs no modifications of the structure of 3G except that new software is added. Because the scheme needs no extra shared secret, it reduces the key storage of User Equipments (UE) and Authentication Centre to O(1). In addition, the troubles of the preassignment of shared secret and key update are omitted, and the mutual authentication and the lawful interception are provided.

Published in:

Global Mobile Congress 2009

Date of Conference:

12-14 Oct. 2009