Extension of authentication protocol for GSM

被引:41
|
作者
Lee, CC
Hwang, MS
Yang, WP
机构
[1] Natl Tsing Hua Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2003年 / 150卷 / 02期
关键词
D O I
10.1049/ip-com:20030290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An extension of the authentication protocol for GSM is proposed to improve some drawbacks of the current GSM authentication protocol including: not supporting bilateral authentication; huge bandwidth consumption between VLR and HLR; stored space overhead in VLR; and overloaded HLR with authentication of mobile stations. As a result, this new extension of the authentication protocol not only improves these drawbacks but also achieves the requirements: mutual authentication, reduction of bandwidth consumption, less storage of VLR database, security, and efficiency. The merit of the proposed protocol is that it does not cause problems and alter the existing architecture of GSM at all. The robustness of the new protocol is also based on security algorithms A3, A5 and A8.
引用
收藏
页码:91 / 95
页数:5
相关论文
共 50 条
  • [41] Robust and simple authentication protocol
    Chien, HY
    Jan, JK
    COMPUTER JOURNAL, 2003, 46 (02): : 193 - 201
  • [42] Lightweight authentication protocol (LAP)
    Chousiadis, C
    Pangalos, G
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 7 - 12
  • [43] Trust Authentication Protocol on the Web
    GUO Ya-jun~ 1
    2. Department of Computer Science
    WuhanUniversityJournalofNaturalSciences, 2006, (01) : 253 - 255
  • [44] Secure Transaction Authentication Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Abi-Char, Pierre E.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 261 - 273
  • [45] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [46] A distributed authentication protocol for VANET
    Liu, Hui
    Li, Hui
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (02): : 58 - 62
  • [47] An improved deniable authentication protocol
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    NETWORKS, 2006, 48 (04) : 179 - 181
  • [48] An Optimized Kerberos Authentication Protocol
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 508 - +
  • [49] Guarantee of authentication protocol security
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    Shanghai Jiaotong Daxue Xuebao, 2008, 4 (518-522):
  • [50] An Improved Deniable Authentication Protocol
    Lin, Chia-Chen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 240 - 243