Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Authentication and Its Privacy Effects
IEEE Internet Computing
Privacy enhanced cellular access security
Proceedings of the 4th ACM workshop on Wireless security
Novel Authentication Algorithm of Future Networks
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
GSM Security Issues and Challenges
SNPD-SAWN '06 Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Improved User Identity Confidentiality for UMTS Mobile Networks
ECUMN '07 Proceedings of the Fourth European Conference on Universal Multiservice Networks
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks
WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
An introduction to access security in UMTS
IEEE Wireless Communications
Hi-index | 0.00 |
Authentication process of user in mobile networks is an important issue. Previous standard of telecommunication Global System for Mobile Communication (GSM) has many security weaknesses. Under Third Generation Partnership Project(3GPP), new standard Universal Mobile Telecommunication System is developed. Which removes the security weaknesses of previous standards. However one security loop hole has been revealed in UMTS. It is the sending of International Mobile Subscriber Identity (IMSI) in plain text over the air interface. In this paper we introduce a security algorithm named as Airam, whose name is derived from developers of this algorithm. It resolves the problem of sending IMSI in plain text over the air interface by implementing asymmetric/symmetric cryptography techniques. We have presented simulation results of Airam algorithm that show how effciently Airam algorithm performs the user authentication process and its effectiveness against replay and imposition attacks.