Skip to main content

An Improvement on Privacy and Authentication in GSM

  • Conference paper
Information Security Applications (WISA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Included in the following conference series:

Abstract

There are a lot of subscribers of GSM across the world. GSM is one of the major achievements in modern cellular telephony. The authentication protocol for GSM has some drawbacks [1,2]. We show why drawbacks occur and propose an improvement on privacy and authentication in GSM not only to improve drawbacks but also to achieve the goals as follows: mutual authentication, reduction of bandwidth consumption between VLR and HLR, reduction of storage space of VLR database, reduction of authentication data flows, security and efficiency. In particular, we show a possible attack to threat MS’s location privacy. The merit of the proposed protocol is that it is based on the existing security algorithm A3, A5 and A8.

Part of this research was supported by the Korea Science and Engineering Foundation, R.O.K., under contract no. R05-2003-000-12083-0.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, C.H., Hwang, M.S., Yang, W.P.: Enhanced privacy and authentication for global system for mobile communications. Wireless networks 5, 231–243 (1999)

    Article  Google Scholar 

  2. Lee, C.C., Hwang, M.S., Yang, W.P.: Extension of authentication protocol for GSM. IEE Proc.-Commun. 150(2) (April 2003)

    Google Scholar 

  3. Molva, R., Samfat, D., Tsudik, G.: Authentication of Mobile Users. IEEE Network, 26–34 (March/April 1994)

    Google Scholar 

  4. El-Fishway, N., Nofal, M., Tadros, A.: An effective approach for authentication of Mobile users. In: IEEE VTC 2002, pp. 598–601 (2002)

    Google Scholar 

  5. Hwang, M.S., Tang, Y.L., Lee, C.C.: An efficient authentication protocol for GSM Networks, pp. 326–329. IEEE, Los Alamitos (2000)

    Google Scholar 

  6. El-Fishway, N., Nofal, M., Tadros, A.: An Improvement on secure communication in PCS, pp. 175–182. IEEE, Los Alamitos (2003)

    Google Scholar 

  7. Xu, M., Upadhyaya, S.: Secure Communication in PCS. In: IEEE VTC 2001, pp. 2193–2197 (2001)

    Google Scholar 

  8. Shieh, S.P., Lin, C.T., Hsueh, J.T.: Secure communication in Global Systems for Mobile Telecommunications. In: Proc. 1st Workshop on Mobile Computing, ROC, pp. 136–142 (1995)

    Google Scholar 

  9. ETSI TS 100 929 v8.1.0 (July 2001)

    Google Scholar 

  10. Eberspacher, J., Vogel, H.-J., Bettstetter, C.: GSM, switching, Services and Protocols, 2nd edn. Wiley, Chichester (2001)

    Book  Google Scholar 

  11. Mehrotra, A.: GSM System Engineering. Artech House Publishers (1997)

    Google Scholar 

  12. Broron, D.: Techniques for privacy and authentication in personal communication systems. IEEE Personal communications, 6–10 (August 1995)

    Google Scholar 

  13. Willas, J.E.: Privacy and authentication needs of PCS. IEEE personal communications, 11–15 (August 1995)

    Google Scholar 

  14. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons Inc., Chichester (1996)

    Google Scholar 

  15. Al-Tawil, K., Akrami, A.: A new Authentication protocol For Roaming Users in GSM Networks. IEEE, Los Alamitos (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, Y.J., Kim, S.J. (2005). An Improvement on Privacy and Authentication in GSM. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics