Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Extension of authentication protocol for GSM

Extension of authentication protocol for GSM

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

An extension of the authentication protocol for GSM is proposed to improve some drawbacks of the current GSM authentication protocol including: not supporting bilateral authentication; huge bandwidth consumption between VLR and HLR; stored space overhead in VLR; and overloaded HLR with authentication of mobile stations. As a result, this new extension of the authentication protocol not only improves these drawbacks but also achieves the requirements: mutual authentication, reduction of bandwidth consumption, less storage of VLR database, security, and efficiency. The merit of the proposed protocol is that it does not cause problems and alter the existing architecture of GSM at all. The robustness of the new protocol is also based on security algorithms A3, A5 and A8.

References

    1. 1)
      • Harn, L., Lin, H.Y.: `Modification to enhance the security of the GSM protocol', Proceedings of the 5th National Conference on Information security, May 1995, Taipei, Taiwan, p. 416–420.
    2. 2)
      • Al-tawil, K., Akrami, A., Youssef, H.: `A new authentication protocol for GSM networks', Proceedings of IEEE 23rd Annual Conference on Local computer networks (LCN’98), 1998, p. 21–30.
    3. 3)
      • C.H. Lee , M.S. Hwang , W.P. Yang . Enhanced privacy and authentication for the global system for mobile communications. Wirel. Netw. , 231 - 243
    4. 4)
      • M.S. Hwang . A remote password authentication scheme based on the digital signature method. Int. J. Comp. Math. , 657 - 666
    5. 5)
      • W. Stallings . (1999) Cryptography and network security: Principles and practice.
    6. 6)
    7. 7)
      • M.S. Hwang , C.H. Lee . Authenticated key-exchange in mobile radio network. Eur. Trans. Telecommun. , 3 , 265 - 269
    8. 8)
      • A. Aziz , W. Diffie . Privacy and authentication for wireless local area networks. IEEE Pers. Commun. , 1 , 24 - 31
    9. 9)
      • Karger , A. Paual , Y. Frankel , A. Herzberg . Security issues in a CDPD wireless network. IEEE Pers. Commun. , 16 - 27
    10. 10)
      • M.S. Hwang , W.P. Yang . Conference key distribution protocols for digital mobile communication systems. IEEE J. Sel. Areas Commun. , 416 - 420
    11. 11)
      • `ETSI Recommendation: Security related network functions', Tech., June 1993, p. GSM 03.20.
    12. 12)
    13. 13)
      • Hwang, M.S., Tang, Y.L., Lee, C.C.: `An efficient authentication protocol for GSM networks', Proceedings of AFCEA/IEEE EuroComm’2000, May 2000, Munich, Germany, p. 326–330.
    14. 14)
      • Lo, C.C., Chen, Y.J.: `A secure communication architecture for GSM networks', Proceedings of IEEE Pacific Rim Conference on Communications, computers and signal processing, 1999, p. 221–224.
    15. 15)
      • `ETSI: Recommendation: Security related network functions', Tech., June 1993, p. GSM 02.09.
    16. 16)
      • M. Rahnema . Overview of the GSM system and protocol architecture. IEEE Commun. Mag. , 92 - 100
    17. 17)
    18. 18)
      • M.S. Hwang , C.C. Lee , Y.L. Tang . An improvement of SPLICE/AS in WIDE against guessing attack. Informatica , 2 , 297 - 302
    19. 19)
    20. 20)
      • D. Samfat , R. Molva , G. Tsudik . Authentication of mobile users. IEEE Netw. , 26 - 34
    21. 21)
    22. 22)
      • Mallinder, B.: `An overview of the GSM system', Proceedings of Third Nordic Seminar on Digital land mobile radio commun., Sept. 1988, Copenhagen, Denmark, p. 12–15.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-com_20030290
Loading

Related content

content/journals/10.1049/ip-com_20030290
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address