Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
GSM System Engineering
A New Authentication Protocol for GSM Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
A Wireless-based Authentication and Anonymous Channels for Large Scale Area
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
DDoS attacks and defense mechanisms: classification and state-of-the-art
Computer Networks: The International Journal of Computer and Telecommunications Networking
Novel Authentication Algorithm of Future Networks
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
Efficient authentication protocols of GSM
Computer Communications
Technical challenges of network anonymity
Computer Communications
Secure communication mechanisms for GSM networks
IEEE Transactions on Consumer Electronics
Security in third Generation Mobile Networks
Computer Communications
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
Security and Communication Networks
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
A symmetric polynomial-based mutual authentication protocol for GSM networks
International Journal of Security and Networks
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.00 |
In this paper, we propose a new anonymous channel protocol for authentication in GSM mobile communication networks. The protocol is the result of incorporating our anonymity scheme to an efficient GSM authentication protocol proposed by Chang et al. As a result, our protocol has all the features of their scheme including anonymity. Compared with the most recent protocols in this area, such as those by Peinado and Hwang et al., we show that our scheme generally is more secure and more efficient.