Authentication protocols for the broadband ISDN billing system

نویسندگان

  • Chi-Chun Lo
  • Yi-Chun Yeh
چکیده

Ž . The broadband integrated services digital network B-ISDN offers a wide variety of services to its customers. From both provider’s and user’s perspective, a fair and flexible billing system is indispensable to the operation of B-ISDN. In this paper, we discuss different billing policies, and their corresponding authentication protocols, which can be used by the B-ISDN billing system. Flat rate and usage-based rate are two most frequently used billing policies. Because of the diversity of B-ISDN services, combining these two billing policies, along with priority pricing, is a feasible scheme for designing a Ž . Ž . B-ISDN billing system. The membership authentication protocol MAP and the personal authentication protocol PAP are proposed to support the authentication requirements of the flat rate and usage-based rate billing policies, respectively. The Ž . MAP applies the cipher block chaining CBC encryption in the two-party authentication protocol, while the PAP is a Ž . modified version of the station-to-station STS authentication protocol. Both protocols are designed in conjunction with a suggested key management method. Cryptanalysis shows that both the MAP and the PAP are very secure. Simulation results indicate that both protocols are efficient for providing mutual authentication. Together, these two protocols provide a good authentication mechanism to the B-ISDN billing system. q 1999 Elsevier Science B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Usage Information Model for Telecommunications Services over B-ISDN

This paper defines an end-to-end Billing Process Model. The processes in this model are mapped to the Telecommunication Management Network (TMN) Model. Usage Metering Interface (UMI) in the process model is defined for between Network Providers (NP) and Equipment Providers (EP). And it is designed for the BICI (Broadband ISDN Inter-Carrier Interface) environment where multiple carriers using AT...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

A Secure RFID Ticket System for Public Transport

A secure RFID ticket system for public transport is proposed in this paper. It supports security properties including secure authentication, unforgeability, correct billing and privacy and can prevent various attacks. It consists of two protocols, both following three principles necessary for secure RFID ticket system. The first protocol is very efficient and suitable for applications with crit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000