Extension of authentication protocol for GSM

被引:41
|
作者
Lee, CC
Hwang, MS
Yang, WP
机构
[1] Natl Tsing Hua Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2003年 / 150卷 / 02期
关键词
D O I
10.1049/ip-com:20030290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An extension of the authentication protocol for GSM is proposed to improve some drawbacks of the current GSM authentication protocol including: not supporting bilateral authentication; huge bandwidth consumption between VLR and HLR; stored space overhead in VLR; and overloaded HLR with authentication of mobile stations. As a result, this new extension of the authentication protocol not only improves these drawbacks but also achieves the requirements: mutual authentication, reduction of bandwidth consumption, less storage of VLR database, security, and efficiency. The merit of the proposed protocol is that it does not cause problems and alter the existing architecture of GSM at all. The robustness of the new protocol is also based on security algorithms A3, A5 and A8.
引用
收藏
页码:91 / 95
页数:5
相关论文
共 50 条
  • [21] Simulating authentication delay in GSM networks
    Al-Tawil, K
    SIMULATION, 1999, 72 (05) : 333 - 336
  • [22] Authentication and key generation for mobile IP using GSM authentication and roaming
    Haverinen, H
    Asokan, N
    Määttänen, T
    2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, 2001, : 2453 - 2457
  • [23] An authentication protocol to MANET
    Puttini, Ricardo
    Me, Ludovic
    De Sousa, Rafael
    2003, World Scientific and Engineering Academy and Society
  • [24] The mithra authentication protocol
    Fremberg, D
    DR DOBBS JOURNAL, 2003, 28 (05): : 44 - +
  • [25] Cryptanalysis of an authentication protocol
    Groza, B
    Petrica, D
    Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Proceedings, 2005, : 147 - 153
  • [26] Maille authentication - A novel protocol for distributed authentication
    Fritz, A
    Paris, JF
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 309 - 322
  • [27] Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
    Li, Guoqiang
    Ogawa, Mizuhito
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2008, 5311 : 374 - +
  • [28] Designing an authentication protocol via authentication test
    Liu, Jiafen
    Zhou, Mingtian
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 823 - 828
  • [29] An RFID Authentication Protocol with Flexible Path Authentication
    Moriyama, Daisuke
    2013 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2013,
  • [30] Retrofitting Mutual Authentication to GSM Using RAND Hijacking
    Khan, Mohammed Shafiul Alam
    Mitchell, Chris J.
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 17 - 31