Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (12): 1-15.doi: 10.11959/j.issn.2096-109x.2018096

• Comprehensive Review •     Next Articles

Overview of mobile communication network authentication

Xinxin HU(),Caixia LIU,Shuxin LIU,Wei YOU,Kang QIAO   

  1. National Digital Switching System Engineering &Technological R&D Center,Zhengzhou 450001,China
  • Revised:2018-10-20 Online:2018-12-15 Published:2018-12-30
  • Supported by:
    The National Natural Science Foundation Innovation Group Project of China(61521003);The National Key Research and Development Program of China(2016YFB0801605)


With the increasingly serious security situation of mobile communication network,it becomes an important issue about how to protect the privacy of legitimate users while providing high-quality communication services,and how to protect the carrier network from being invaded becomes an important issue in the field of mobile communication security.Authentication is an important means for users and networks to authenticate each other's legitimacy.Authentication methods are also evolving along with network evolution.Starting with the authentication methods of past mobile communication networks (GSM,CDMA,UMTS,LTE),the advantages and disadvantages of each generation of authentication technology are analysed,along with which the authentication technology and unified authentication technology of the fifth-generation (5G) mobile communication to be commercialized are emphatically analysed.In the last,reasonable prospect for the development of authentication technology in the future are proposed.

Key words: mobile network, authentication, security, 5G mobile communication, unified authentication

CLC Number: 

No Suggested Reading articles found!