Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A New Authentication Protocol for GSM Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
Overview of the GSM system and protocol architecture
IEEE Communications Magazine
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
Authentication of mobile users
IEEE Network: The Magazine of Global Internetworking
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks
Wireless Personal Communications: An International Journal
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
IEEE/ACM Transactions on Networking (TON)
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Wireless Personal Communications: An International Journal
A symmetric polynomial-based mutual authentication protocol for GSM networks
International Journal of Security and Networks
An enhanced NPA protocol for secure communications in GSM network
International Journal of Security and Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.24 |
Undoubtedly, GSM is the most important standard of the worldwide wireless communication in recent periods. The authentication protocol is the main component of the GSM architecture. However, there are several drawbacks found in the existing authentication protocol of GSM, such as bandwidth consumption between VLR and HLR, storage overhead in VLR, and the property that VLR cannot be authenticated. Nowadays, many authentication protocols are proposed to improve these drawbacks. Among them, Hwang et al's protocol [C.C. Lee, M.S. Hwang, W.P. Yang, Extension of authentication protocol for GSM, IEE Proceedings of Communication, 150(2) (2003) 91-95 [1]], proposed in 2003, can solve the above drawbacks. However, authenticating VLR is just executed at the first time, which MS joins into a new visiting VLR to ask for communication service. In this paper, we propose an improvement to modify Hwang et al's protocol such that mutual authentication between VLR and MS is ensured at anytime while MS sends an authentication request. In addition, we also propose a brand-new authentication protocol which can not only solve those drawbacks but also make the authentication more efficient.