Scheme for secure digital mobile communications based on symmetric key cryptography
Information Processing Letters
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Cryptography and data security
Cryptography and data security
The GSM System for Mobile Communications
The GSM System for Mobile Communications
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Mobile services access and payment through reusable tickets
Computer Communications
Efficient authentication protocols of GSM
Computer Communications
DoS-resistant ID-based password authentication scheme using smart cards
Journal of Systems and Software
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
IEEE/ACM Transactions on Networking (TON)
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
TMSI allocation mechanism using a secure VLR authorization in the GSM system
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
SUALPPA scheme: enhanced solution for user authentication in the GSM system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
An improvement on privacy and authentication in GSM
WISA'04 Proceedings of the 5th international conference on Information Security Applications
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
An enhanced NPA protocol for secure communications in GSM network
International Journal of Security and Networks
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security-related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.