CAVE-based authentication


CAVE-based Authentication is an access authentication protocol used in CDMA/1xRTT computer network systems.

CAVE (Cellular Authentication and Voice Encryption)

There are two network entities involved in CAVE-based authentication when roaming:
The authentication controller is the entity that determines whether the response from the MS is correct. Depending upon whether SSD is shared, the authentication controller may be either the AC or VLR. In either case, CAVE-based authentication is based on the CAVE algorithm and the following two shared keys:
CAVE-based authentication provides two types of challenges
CAVE-based authentication is a one-way authentication mechanism that always involves the network authenticating the MS.
CAVE-based authentication procedures are specified in TIA-41.