TMSI Allocation Mechanism Using a Secure VLR Authorization in the GSM System

نویسندگان

  • Mi-Og Park
  • Dea-Woo Park
  • Sang-Geun Kim
چکیده

GSM is the most popular standard for mobile phones in the world. In spite of the tremendous market growth, however, the GSM system has the fatal security problems in TMSI allocation protocol. These problems are right user authentication and location privacy. In this paper, we propose the secure TMSI allocation mechanism using the certification concept to solve these problems. The proposed mechanism provides partial anonymity, which has been rarely provided in the other approaches. Also we propose the modified mechanism to reduce TMSI allocation procedure without changing of the architecture of the original GSM system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

With its great features like providing access to users at anytime and anywhere in the world, mobile communication has been very attractive among the users as well as operators and service providers. However, despite of several advantages, mobile communication has also been facing many security problems. In 2G and 3G technologies like GSM, GPRS and UMTS, the architectures comprise of mainly thre...

متن کامل

The mechanism of Umayyad authorization in the beginning of Islam with emphasis on the role of the four geniuses

The transformation of the Islamic caliphate to the Umayyad dynasty took place in a short time after the death of Prophet Mohammad. This transformation became the source of many questions and reflections, especially since those who led such a change were Islam’s antagonists in the early years of prophecy and the rise of Islamic rule. Although, the role of the deep-rooted tradition of tribalism a...

متن کامل

Efficient authentication protocols of GSM

Undoubtedly, GSM is the most important standard of the worldwide wireless communication in recent periods. The authentication protocol is the main component of the GSM architecture. However, there are several drawbacks found in the existing authentication protocol of GSM, such as bandwidth consumption between VLR and HLR, storage overhead in VLR, and the property that VLR cannot be authenticate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006