Extension of authentication protocol for GSM

被引:41
|
作者
Lee, CC
Hwang, MS
Yang, WP
机构
[1] Natl Tsing Hua Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2003年 / 150卷 / 02期
关键词
D O I
10.1049/ip-com:20030290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An extension of the authentication protocol for GSM is proposed to improve some drawbacks of the current GSM authentication protocol including: not supporting bilateral authentication; huge bandwidth consumption between VLR and HLR; stored space overhead in VLR; and overloaded HLR with authentication of mobile stations. As a result, this new extension of the authentication protocol not only improves these drawbacks but also achieves the requirements: mutual authentication, reduction of bandwidth consumption, less storage of VLR database, security, and efficiency. The merit of the proposed protocol is that it does not cause problems and alter the existing architecture of GSM at all. The robustness of the new protocol is also based on security algorithms A3, A5 and A8.
引用
收藏
页码:91 / 95
页数:5
相关论文
共 50 条
  • [31] Network Authentication Protocol Based on McroPayment Protocol
    Shen Qunli
    Lv Jiong
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 5949 - 5953
  • [32] Authentication protocol for TETRA with authentication algorithm running in HLR
    Li, H
    Yang, YX
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 403 - 406
  • [33] OVERVIEW OF THE GSM SYSTEM AND PROTOCOL ARCHITECTURE
    RAHNEMA, M
    IEEE COMMUNICATIONS MAGAZINE, 1993, 31 (04) : 92 - 100
  • [34] Modelling the GSM Handover Protocol in COMMUNITY
    Oliveira, Cristovao
    Wermelinger, Michel
    Luiz Fiadeiro, Jose
    Lopes, Antonia
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 141 (03) : 3 - 25
  • [35] Validation of the GSM-MAP protocol
    Cavalli, A
    Ionescu, M
    ANNALS OF TELECOMMUNICATIONS, 2000, 55 (1-2) : 58 - 69
  • [36] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [37] A Federated Protocol for Active Authentication
    Nick, William
    Murphy, Alaysia
    Sabol, Cory
    Esterline, Albert
    SOUTHEASTCON 2017, 2017,
  • [38] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [39] A novel protocol for software authentication
    He R.
    Qin Z.
    Wu S.
    Information Technology Journal, 2010, 9 (02) : 395 - 398
  • [40] Cryptanalysis of a Multifactor Authentication Protocol
    Likitha, Soorea
    Saravanan, R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 35 - 42