Security protocol for IMT-2000-based contents service

Sang Soo Yeo, Deok Gyu Lee, Kouichi Sakurai

研究成果: ジャーナルへの寄稿記事

抄録

IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information.[1] However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and authentication issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 authentication method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

元の言語英語
ページ(範囲)11-20
ページ数10
ジャーナルInternational Journal of Multimedia and Ubiquitous Engineering
1
発行部数4
出版物ステータス出版済み - 2006

Fingerprint

Authentication
Network protocols
Communication
Telecommunication
Wire
Internet

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

これを引用

Security protocol for IMT-2000-based contents service. / Yeo, Sang Soo; Lee, Deok Gyu; Sakurai, Kouichi.

:: International Journal of Multimedia and Ubiquitous Engineering, 巻 1, 番号 4, 2006, p. 11-20.

研究成果: ジャーナルへの寄稿記事

@article{6cd76462705f4e19b5b170b754f4d1e8,
title = "Security protocol for IMT-2000-based contents service",
abstract = "IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information.[1] However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and authentication issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 authentication method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.",
author = "Yeo, {Sang Soo} and Lee, {Deok Gyu} and Kouichi Sakurai",
year = "2006",
language = "English",
volume = "1",
pages = "11--20",
journal = "International Journal of Multimedia and Ubiquitous Engineering",
issn = "1975-0080",
publisher = "Science and Engineering Research Support Society",
number = "4",

}

TY - JOUR

T1 - Security protocol for IMT-2000-based contents service

AU - Yeo, Sang Soo

AU - Lee, Deok Gyu

AU - Sakurai, Kouichi

PY - 2006

Y1 - 2006

N2 - IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information.[1] However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and authentication issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 authentication method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

AB - IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information.[1] However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and authentication issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 authentication method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

UR - http://www.scopus.com/inward/record.url?scp=84863038821&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84863038821&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84863038821

VL - 1

SP - 11

EP - 20

JO - International Journal of Multimedia and Ubiquitous Engineering

JF - International Journal of Multimedia and Ubiquitous Engineering

SN - 1975-0080

IS - 4

ER -