Abstract
There are a lot of subscribers of GSM across the world. GSM is one of the major achievements in modern cellular telephony. The authentication protocol for GSM has some drawbacks [1,2]. We show why drawbacks occur and propose an improvement on privacy and authentication in GSM not only to improve drawbacks but also to achieve the goals as follows: mutual authentication, reduction of bandwidth consumption between VLR and HLR, reduction of storage space of VLR database, reduction of authentication data flows, security and efficiency. In particular, we show a possible attack to threat MS’s location privacy. The merit of the proposed protocol is that it is based on the existing security algorithm A3, A5 and A8.
Part of this research was supported by the Korea Science and Engineering Foundation, R.O.K., under contract no. R05-2003-000-12083-0.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, C.H., Hwang, M.S., Yang, W.P.: Enhanced privacy and authentication for global system for mobile communications. Wireless networks 5, 231–243 (1999)
Lee, C.C., Hwang, M.S., Yang, W.P.: Extension of authentication protocol for GSM. IEE Proc.-Commun. 150(2) (April 2003)
Molva, R., Samfat, D., Tsudik, G.: Authentication of Mobile Users. IEEE Network, 26–34 (March/April 1994)
El-Fishway, N., Nofal, M., Tadros, A.: An effective approach for authentication of Mobile users. In: IEEE VTC 2002, pp. 598–601 (2002)
Hwang, M.S., Tang, Y.L., Lee, C.C.: An efficient authentication protocol for GSM Networks, pp. 326–329. IEEE, Los Alamitos (2000)
El-Fishway, N., Nofal, M., Tadros, A.: An Improvement on secure communication in PCS, pp. 175–182. IEEE, Los Alamitos (2003)
Xu, M., Upadhyaya, S.: Secure Communication in PCS. In: IEEE VTC 2001, pp. 2193–2197 (2001)
Shieh, S.P., Lin, C.T., Hsueh, J.T.: Secure communication in Global Systems for Mobile Telecommunications. In: Proc. 1st Workshop on Mobile Computing, ROC, pp. 136–142 (1995)
ETSI TS 100 929 v8.1.0 (July 2001)
Eberspacher, J., Vogel, H.-J., Bettstetter, C.: GSM, switching, Services and Protocols, 2nd edn. Wiley, Chichester (2001)
Mehrotra, A.: GSM System Engineering. Artech House Publishers (1997)
Broron, D.: Techniques for privacy and authentication in personal communication systems. IEEE Personal communications, 6–10 (August 1995)
Willas, J.E.: Privacy and authentication needs of PCS. IEEE personal communications, 11–15 (August 1995)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons Inc., Chichester (1996)
Al-Tawil, K., Akrami, A.: A new Authentication protocol For Roaming Users in GSM Networks. IEEE, Los Alamitos (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choi, Y.J., Kim, S.J. (2005). An Improvement on Privacy and Authentication in GSM. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)