Abstract
The Global System for mobile communication (GSM) is widely used for mobile communication where the mobile users can make and receive call when they are moving independent of time, location, and network access. The wireless mobile systems are more vulnerable to deceitful access and eaves dropping. Though the authentication process on GSM is giving a reasonable security level but have some drawbacks such as: 1. overloading the network traffic and increasing the call set up time 2. Not support the mutual authentication 3. Storage overhead of visitor location registers (VLR) 4. Overload on home location registers (HLR) with authentication of mobile station. There are many protocol already proposed to overcome the above drawback but they can not overcome all the point. In this paper we are going to propose a authentication to overcome the drawback of GSM security process by using the combination the symmetric and asymmetric key cryptographic method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, C.-C., LiaoI-En, Hwang, M.-S.: An efficient authentication protocol for mobile communications. Telecommun. Syst. (2010), doi:10.1007/s11235-009-9276-4.2010
Dominguez, A.P.: Cryptanalysis of Parka’s authentication protocol in wireless mobile communication systems. International Journal of Network Security 3(3), 279–282 (2006)
Hwang, M.-S.: Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology 48(5), 1469–1474 (1999)
http://www.roggeweck.net/uploads/media/StudentGSM_Architecture.pdf
Hwang, M.-S., Lee, C.-C., Lee, J.-Z.: A new anonymous channel protocol in wirelesscommunications. International Journal on Electronics and Communications 58(3), 218–222 (2004)
Kumar, K.P., Shailaja, G., Kavitha, A., Saxena, A.: Mutual authentication and key agreement for GSM. In: International Conference on Mobile Business, pp. 25–28 (June 2006)
Ammayappan, K., Saxena, A., Negi, A.: Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: International Conference on Advanced Computing and Communications, pp. 183–186 (December 2006)
Fanian, A., Berenjkoub, M., Gulliver, T.A.: A new mutual authentication protocol for GSM networks. In: Canadian Conference on Electrical and Computer Engineering, pp. 798–803 (May 2009)
Hahn, G., Kwon, T., Kim, S., Song, J.: Design and analysis of improved GSM authentication protocol for roaming users. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 451–458. Springer, Heidelberg (2004)
Kumar, K.P., Shailaja, G., Kavitha, A., Saxena, A.: Mutual authentication and key agreement for GSM. In: International Conference on Mobile Business, pp. 25–28 (June 2006)
Ammayappan, K., Saxena, A., Negi, A.: Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: International Conference on Advanced Computing and Communications, pp. 183–186 (2006)
Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)
May, P., Ehrlich, H.C., Steinke, T.: ZIB Structure Prediction Pipeline: Composing a Complex Biological Workflow through Web Services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)
Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid Information Services for Distributed Resource Sharing. In: 10th IEEE International Symposium on High Performance Distributed Computing, pp. 181–184. IEEE Press, New York (2001)
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum, National Center for Biotechnology Information (2002), http://www.ncbi.nlm.nih.gov
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roy, T., Dutta, K. (2011). Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22543-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22542-0
Online ISBN: 978-3-642-22543-7
eBook Packages: Computer ScienceComputer Science (R0)