Skip to main content
Erschienen in: Wireless Personal Communications 1/2014

01.11.2014

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)

verfasst von: Imran Memon, Mohammed Ramadan Mohammed, Rizwan Akhtar, Hina Memon, Muhammad Hammad Memon, Riaz Ahmed Shaikh

Erschienen in: Wireless Personal Communications | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent years, the mobile technology has experienced a great increment in the number of its users. The GSM’s architecture provides different security features like authentication, data/signaling confidentiality and secrecy of user yet the channel is susceptible to replay and interleaved. It always remains relevant as it is important in all types of application. Global system for mobile (GSM) communications has become the most popular standard for digital cellular communication. The GSM security system depends on encryption, authentication algorithms and information from SIM card. In this research paper, we proposed the design and implementation of a new authentication scheme by using certificate-less public key cryptography (CL-PKC) over the GSM system was attempted to miss some system detail. This research paper, we also proposed the GSM system and its security and public key cryptography with a focus in the CL-PKC; the CL-PKC is a simple, useful and robust security scheme designed and implemented over GSM. Our approach is more efficient than other competing topologies. We solved the GSM problem in A3 algorithm such as eavesdropping and this problem solved by CL-PKC because of its robustness against this type of attack by providing mutual authentication make the system more secure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bridle, J. S. (1990). Probabilistic interpretation of feedforward classification network outputs, with relationships to statistical pattern recognition. In Neurocomputing (pp. 227–236). Berlin: Springer. Bridle, J. S. (1990). Probabilistic interpretation of feedforward classification network outputs, with relationships to statistical pattern recognition. In Neurocomputing (pp. 227–236). Berlin: Springer.
2.
Zurück zum Zitat Tarjan, R. E., & Yannakakis, M. (1984). Simple linear-time algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM Journal on Computing, 13(3), 566–579.MathSciNetCrossRefMATH Tarjan, R. E., & Yannakakis, M. (1984). Simple linear-time algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM Journal on Computing, 13(3), 566–579.MathSciNetCrossRefMATH
3.
Zurück zum Zitat Goswami, S., Laha, S., Chakraborty, S., & Dhar, A. (2012). Enhancement of GSM Security using elliptic curve cryptography algorithm. In Intelligent systems, modelling and simulation (ISMS), 2012 third international conference on (pp. 639–644). IEEE. Goswami, S., Laha, S., Chakraborty, S., & Dhar, A. (2012). Enhancement of GSM Security using elliptic curve cryptography algorithm. In Intelligent systems, modelling and simulation (ISMS), 2012 third international conference on (pp. 639–644). IEEE.
4.
Zurück zum Zitat Driessen, B., Hund, R., Willems, C., Paar, C., & Holz, T. (2013). An experimental security analysis of two satphone standards. ACM Transactions on Information and System Security (TISSEC), 16(3), 10.CrossRef Driessen, B., Hund, R., Willems, C., Paar, C., & Holz, T. (2013). An experimental security analysis of two satphone standards. ACM Transactions on Information and System Security (TISSEC), 16(3), 10.CrossRef
5.
Zurück zum Zitat Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In Computer and information technology (CIT), 2010 IEEE 10th international conference on (pp. 1079–1084). IEEE. Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In Computer and information technology (CIT), 2010 IEEE 10th international conference on (pp. 1079–1084). IEEE.
6.
Zurück zum Zitat Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM. Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM.
7.
Zurück zum Zitat Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM. Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM.
8.
Zurück zum Zitat Yin, X., & Han, J. (2003). CPAR: Classification based on predictive association rules, Proceedings 2003 SIAM International Conference on Data Mining (SDM’03), San Francisco CA, pp. 331–335. Yin, X., & Han, J. (2003). CPAR: Classification based on predictive association rules, Proceedings 2003 SIAM International Conference on Data Mining (SDM’03), San Francisco CA, pp. 331–335.
9.
Zurück zum Zitat Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM.
10.
Zurück zum Zitat Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM. Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM.
11.
Zurück zum Zitat Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM. Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM.
12.
Zurück zum Zitat Teng, J., & Wu, C. (2012). A provable authenticated certificateless group key agreement with constant rounds. Journal of Communications and Networks, 14(1), 104–110.CrossRef Teng, J., & Wu, C. (2012). A provable authenticated certificateless group key agreement with constant rounds. Journal of Communications and Networks, 14(1), 104–110.CrossRef
13.
Zurück zum Zitat Hableel, E., Byon, Y.-J., & Beak, J. (2013). Public key infrastructure for UAE: A case study. In Proceedings of the 6th international conference on security of information and networks (pp. 336–340). ACM. Hableel, E., Byon, Y.-J., & Beak, J. (2013). Public key infrastructure for UAE: A case study. In Proceedings of the 6th international conference on security of information and networks (pp. 336–340). ACM.
14.
Zurück zum Zitat Ray, S., & Biswas, G. (2012). An ECC based public key infrastructure usable for mobile applications. In Proceedings of the second international conference on computational science, engineering and information technology (pp. 562–568). ACM. Ray, S., & Biswas, G. (2012). An ECC based public key infrastructure usable for mobile applications. In Proceedings of the second international conference on computational science, engineering and information technology (pp. 562–568). ACM.
15.
Zurück zum Zitat Praveen, I., & Sethumadhavan, M. (2012). A more efficient and faster pairing computation with cryptographic security. In Proceedings of the first international conference on security of internet of things (pp. 145–149). ACM. Praveen, I., & Sethumadhavan, M. (2012). A more efficient and faster pairing computation with cryptographic security. In Proceedings of the first international conference on security of internet of things (pp. 145–149). ACM.
16.
Zurück zum Zitat Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM.
17.
Zurück zum Zitat Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.MathSciNetCrossRef Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.MathSciNetCrossRef
18.
Zurück zum Zitat Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473, Springer). Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473, Springer).
19.
Zurück zum Zitat Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM. Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM.
20.
Zurück zum Zitat Li, J., Huang, X., Mu, Y., Susilo, W., & Wu, Q. (2007). Certificate-based signature: Security model and efficient construction. In Public key infrastructure (pp. 110–125). Springer. Li, J., Huang, X., Mu, Y., Susilo, W., & Wu, Q. (2007). Certificate-based signature: Security model and efficient construction. In Public key infrastructure (pp. 110–125). Springer.
Metadaten
Titel
Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)
verfasst von
Imran Memon
Mohammed Ramadan Mohammed
Rizwan Akhtar
Hina Memon
Muhammad Hammad Memon
Riaz Ahmed Shaikh
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1879-8

Weitere Artikel der Ausgabe 1/2014

Wireless Personal Communications 1/2014 Zur Ausgabe

Neuer Inhalt