Abstract
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered and mutual authentication should be conducted between the subscriber and the serving network. Several protocols have been proposed by standards bodies and independent researchers in recent years to counteract these threats. However, the strength of these protocols is usually weakened in the roaming environment where the security breach of a visited network could lead to persistent damages to subscribers who visit. The subscriber's identity is not well protected in most protocols, and appropriate mechanisms solving disputes on roaming bills are not supported either. To solve these problems, new authentication protocols are proposed in this paper with new security features that have not been fully explored before.
- 1 A. Aziz and W. Diffie, "Privacy and Authentication for Wireless Local Area Network", IEEE Personal Communications, First Quarter, 1994, pp. 25-31.Google ScholarCross Ref
- 2 M. J. Beller, L. Cheng, Y. Yacobi, "Privacy and Authentication on a Portable Communication System", IEEE J. on Selected Areas in Communications, Vol. 11, No. 6, pp. 821-829, Aug. 1993.Google ScholarDigital Library
- 3 Dan Brown, "Security Planning for Personal Communications", Proc. of Ist ACM Conference on Computer and Communications Security, pp. 107-111, Nov. 1993. Google ScholarDigital Library
- 4 M. Burrows, M. Abai, and R. Needham, "A Logic of Authentication", ACM Transaction on Computer Systems, Vol. 8, No. 1, Feb. 1990, pp. 18-36. Google ScholarDigital Library
- 5 U. Carlsen, "Optimal Privacy and Authetication on a portable Communications System", Operating Systems Review, June, 1994. Google ScholarDigital Library
- 6 Cellular Digital Packet data (CDPD) System Specification, Release 1.0, July 19, 1993.Google Scholar
- 7 J.C. Cook, and R.L. Brewster, "Cryptographic Security Techniques for Digital Mobile Phones", IEEE International Conference on Selected Topics in Wireless Communications, pp. 425~428, 1992.Google ScholarCross Ref
- 8 S. Eckelman, "Minimizing Fraud", Telephone Engineering and Management, Vol. 94, No, 18, pp. 62-64, Sept. 1990.Google Scholar
- 9 EIA/TIA-IS-54-BGoogle Scholar
- 10 ETSi, ETS 300 175-7, October 1992.Google Scholar
- 11 ETSI/TC Recommendation GSM 03.20, Security Related Network Function, version 3.3.2, Jan. 1991.Google Scholar
- 12 H.Y. Lin and L. Ham, "Authentications in Wireless Communications," Proc. of GLOBECOM '93, pp. 550-554, Nov. 29-Dec. 2, 1993.Google Scholar
- 13 R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users", IEEE Network, pp. 26-34, March/April, 1994.Google ScholarDigital Library
- 14 R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystem", Comm. of. ACM, Vol. 21, No. 12, 1978, pp. 120-126. Google ScholarDigital Library
- 15 M. Shand and J. Vuillemin. Fast implementations of RSA cryptography. In Proceedings of the 11 th IEEE Symposium on Computer Arithmetic, p.p. 252--259, IEEE Computer Society Press, Los Alamitos, CA, 1993.Google ScholarCross Ref
- 16 M. Spreitzer and M. Theimer, "Scalable, Secure, Mobile Computing with Location information", Communications of the ACM, Vol. 36, Iss. 7, p. 27, July, 1993. Google ScholarDigital Library
- 17 K. Vedder, "Security Aspects of Mobile Communication", Computer Security and Industrial Cryptography - State of the Art and Evolution, East Course, Springer-Verlag, May, 1991, pp. 193-210. Google ScholarDigital Library
- 18 M. Walker, "Security in Mobile and Cordless Telecommunications", Computer Systems and Software Engineering, Proceedings of CompEuro 1992, 1992, pp. 493-496.Google ScholarCross Ref
Index Terms
- Authentication protocols for personal communication systems
Recommendations
Authentication protocols for personal communication systems
SIGCOMM '95: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communicationMasquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered and mutual authentication should be ...
On the Security of Some Password Authentication Protocols
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password ...
Efficient authentication protocols of GSM
Undoubtedly, GSM is the most important standard of the worldwide wireless communication in recent periods. The authentication protocol is the main component of the GSM architecture. However, there are several drawbacks found in the existing ...
Comments