Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A New Authentication Protocol for GSM Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
A new authentication protocol for UMTS mobile networks
EURASIP Journal on Wireless Communications and Networking
Hi-index | 0.00 |
Mobile phones are rapidly becoming one of the most popular tools for communication. The rapid growth of wireless technology and the increasing use of such technologies in coordination with the internet require a very careful look at the issue of security. Security, Authentication, Encryption and Access Control are vital features that must be present in any communication network.In our paper we will investigate the existing authentication mechanisms for mobile communications and analyses these mechanisms as a step to propose enhancement to authentication. Specifically, the authentication signalling in GSM and UMTS mobile networks is minimized, and consequently the bottleneck at authentication centre is avoided, by reducing the number of messages between mobile and authentication centre (i.e. reducing the procedures of authentication), and then reducing the authentication times, setup time and data sizes. The replay attacks and guessing attack are infeasible because the subscriber uses different key to request for authentication.