Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Wireless and personal communications systems
Wireless and personal communications systems
An Enhanced Authentication Protocol for Personal Communication Systems
ASSET '98 Proceedings of the 1998 IEEE Workshop on Application - Specific Software Engineering and Technology
Information Systems Frontiers
A fair and secure mobile billing system
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new mobile payment scheme for roaming services
Electronic Commerce Research and Applications
Efficient authentication protocols of GSM
Computer Communications
A fair and secure mobile billing system
Computer Networks: The International Journal of Computer and Telecommunications Networking
SETNR/A: an agent-based secure payment protocol for mobile commerce
International Journal of Intelligent Information and Database Systems
A Provable Billing Protocol on the Current UMTS
Wireless Personal Communications: An International Journal
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
Expert Systems with Applications: An International Journal
TMSI allocation mechanism using a secure VLR authorization in the GSM system
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
SUALPPA scheme: enhanced solution for user authentication in the GSM system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
A symmetric polynomial-based mutual authentication protocol for GSM networks
International Journal of Security and Networks
Hi-index | 0.25 |
In this article, we analyze an authentication protocol, compatible with Global System for Mobile (GSM) communication, that employs an additional one way function to establish trust between a Mobile Unit and Visiting Location Register for the purpose of non-repudiation of service. The security of this protocol is discussed and a traffic analysis is performed indicating that the protocol's message overhead during call origination is tolerable under various cell densities and traversal rates. The message penalty for use of the additional one way function is under 15% of total control traffic at vehicular speeds with an origination rate of 5.6 calls per handset per hour. The penalty for pedestrian traffic and high origination rate is about 23% of total control traffic. Therefore, the enhanced protocol appears undesirable for pedestrian networks unless the potential for fraud is great. However, the more modest overhead associated with vehicular traffic is acceptable when billing accuracy and service settlement is required between Personal Communications Networks.