By Topic

A Secure Access Approach of UMTS Terminal Based on Trusted Computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wen Yingyou ; Coll. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Peng Xuena ; Chen Shuyi ; Zhao Hong

On the basis of comprehensive study of trusted computing technology and the threats to 3G network, a DAA-based key management and a trusted computing based access mechanism for 3G network are proposed, furthermore, a predicate logic based formal analysis method is also proposed. With DAA mechanism, user privacy is protected and the bottleneck problem of centralized CA is avoided. The proposed MTM-based trusted access mechanism focuses on not only the authentication of mobile user, but also the healthy status of the mobile user. Therefore, the UMTS network can forbid the unsafe mobile terminals from accessing it, which guarantees the security of the network from the source. The validity of trusted UMTS access scheme is verified with the proposed formal analysis method.

Published in:

Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on  (Volume:2 )

Date of Conference:

24-25 April 2010