Efficient authentication protocols of GSM

نویسندگان

  • Chin-Chen Chang
  • Jung-San Lee
  • Ya-Fen Chang
چکیده

Undoubtedly, GSM is the most important standard of the worldwide wireless communication in recent periods. The authentication protocol is the main component of the GSM architecture. However, there are several drawbacks found in the existing authentication protocol of GSM, such as bandwidth consumption between VLR and HLR, storage overhead in VLR, and the property that VLR cannot be authenticated. Nowadays, many authentication protocols are proposed to improve these drawbacks. Among them, Hwang et al’s protocol [C.C. Lee, M.S. Hwang, W.P. Yang, Extension of authentication protocol for GSM, IEE Proceedings of Communication, 150(2) (2003) 91–95 [1]], proposed in 2003, can solve the above drawbacks. However, authenticating VLR is just executed at the first time, which MS joins into a new visiting VLR to ask for communication service. In this paper, we propose an improvement to modify Hwang et al’s protocol such that mutual authentication between VLR and MS is ensured at anytime while MS sends an authentication request. In addition, we also propose a brand-new authentication protocol which can not only solve those drawbacks but also make the authentication more efficient. q 2005 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Study Report on Authentication Protocols in GSM, GPRS and UMTS

Masquerading and eavesdropping are major threats in mobile Communications. To provide protection in communication we require enciphering of voice message and authentication for subscriber with the communication network. This paper presents a complete study report on authentication protocols and its application on mobile communication systems like GSM, GPRS and UMTS. In addition, we describe the...

متن کامل

PANA/GSM Authentication for Internet Access

Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/GSM authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PA...

متن کامل

Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms

Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21 st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the archite...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2005