An Introduction to GSM
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Speech Privacy Technophobes Need Not Apply
IEEE Security and Privacy
Mitigating Denial of Service Threats in GSM Networks
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
SMS: The Short Message Service
Computer
Efficient authentication protocols of GSM
Computer Communications
Fault Injection Attack on A5/3
ISPA '11 Proceedings of the 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Mobile communication is a very rapidly growing technology of the telecommunication industry. Nowadays, it is possible to make and receive calls independent of location and time just because of mobile communication over the network. With its attractive features like providing access to users at anytime and anywhere in the world, mobile communication has been very popular among the users and service providers. However, despite of several advantages, mobile communication has also been facing many security problems. 2G GSM architecture has several problems including unidirectional authentication and extra storage is needed for VLR to store authentication information. Existing algorithms A3, A8 and A5 are also vulnerable to various attacks like Man-in-the-Middle attack, Reply attack, DoS attack, Interleave attack etc. This paper deals with the problems of original 2G GSM architecture and attacks with existing algorithms. The authors propose three new algorithms COMP NPA3/NPA8 and NPA5 which prevent the GSM network from various attacks. With these algorithms and change in mechanism, mutual authentication is provided between the MS and BS and there is no need to have extra storage for VLR.