Handbook of Applied Cryptography
Handbook of Applied Cryptography
A New Authentication Protocol for GSM Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
A Wireless-based Authentication and Anonymous Channels for Large Scale Area
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
A Strong User Authentication Protocol for GSM
WETICE '05 Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
Mitigating Denial of Service Threats in GSM Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Efficient authentication protocols of GSM
Computer Communications
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
Overview of the GSM system and protocol architecture
IEEE Communications Magazine
Performance of an enhanced GSM protocol supporting non-repudiation of service
Computer Communications
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.00 |
GSM is the most popular standard for wireless cellular networks with 3 billion handsets in use worldwide. One of the critical components in the GSM architecture is the authentication protocol. The current protocol has several drawbacks such as one-way entity authentication, memory overhead in the VLR and bandwidth consumption between the HLR and VLR. Several solutions have been proposed to establish mutual entity authentication and to improve performance. However, they either cannot provide flaw-free bilateral entity authentication or impose more overhead in GSM networks. In this paper, we propose a novel mutual entity authentication based on symmetric polynomials. Each MS is allocated a share of the authentication polynomial during initial authentication. In subsequent authentication requests, the MS and VLR authenticate each other using this symmetric polynomial. The proposed solution not only provides secure bilateral authentication, but also decreases the memory overhead in the VLR and the required connection bandwidth.