Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2005, Vol. 28 ›› Issue (2): 76-79.doi: 10.13190/jbupt.200502.76.lih

• Reports • Previous Articles     Next Articles

An Improved Authentication Protocol of TETRA

LI Hui1,YANG Zhu2,YANG Yixian1   

  1. 1.Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;  2.College of Computer Science, Southwest University of Science and Technology, Chengdu 861000, China
  • Online:2005-04-28 Published:2005-04-28

Abstract: An authentication protocol for TETRA with authentication algorithm running in HLR instead of VLR is presented in this paper. The proposed protocol can effectively avoid the generation of an open attack for known text once the communication security between VLR and HLR can not be guaranteed.It is good for roaming between networks, meets the requirements for the independence of the authentication algorithm. The proposed protocol can improve the security of actual digital trunked system.

Key words: authentication, digital trunked system, challengeresponse protocol

CLC Number: