Security protocol for IMT-2000-based contents service

Sang Soo Yeo, Deok Gyu Lee, Kouichi Sakurai

Research output: Contribution to journalArticlepeer-review

Abstract

IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information.[1] However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and authentication issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 authentication method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

Original languageEnglish
Pages (from-to)11-20
Number of pages10
JournalInternational Journal of Multimedia and Ubiquitous Engineering
Volume1
Issue number4
Publication statusPublished - 2006

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Security protocol for IMT-2000-based contents service'. Together they form a unique fingerprint.

Cite this