This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
CAVE-based authentication is an access authentication protocol based on used in CDMA2000 1X 3G mobile network systems, using the CAVE (Cellular Authentication and Voice Encryption) algorithm.[1] It is also known as HLR authentication, 2G Authentication, or Access Authentication.
There are two network entities involved in CAVE-based authentication when roaming:
The authentication controller is the entity that determines whether the response from the MS is correct. Depending upon whether SSD is shared, the authentication controller may be either the AC or VLR. In either case, CAVE-based authentication is based on the CAVE algorithm and the following two shared keys:
CAVE-based authentication provides two types of challenges:
CAVE-based authentication is a one-way authentication mechanism that always involves the network authenticating the MS (with the exception of the base station challenge procedure that occurs only during an SSD update).
CAVE-based authentication procedures are specified in TIA-41 (3GPP2 X.S0004).
| |
---|---|
Authentication APIs |
|
Authentication protocols |
|
|