Skip to main content

Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography

  • Conference paper
Trends in Network and Communications (WeST 2011, NeCoM 2011, WiMoN 2011)

Abstract

The Global System for mobile communication (GSM) is widely used for mobile communication where the mobile users can make and receive call when they are moving independent of time, location, and network access. The wireless mobile systems are more vulnerable to deceitful access and eaves dropping. Though the authentication process on GSM is giving a reasonable security level but have some drawbacks such as: 1. overloading the network traffic and increasing the call set up time 2. Not support the mutual authentication 3. Storage overhead of visitor location registers (VLR) 4. Overload on home location registers (HLR) with authentication of mobile station. There are many protocol already proposed to overcome the above drawback but they can not overcome all the point. In this paper we are going to propose a authentication to overcome the drawback of GSM security process by using the combination the symmetric and asymmetric key cryptographic method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, C.-C., LiaoI-En, Hwang, M.-S.: An efficient authentication protocol for mobile communications. Telecommun. Syst. (2010), doi:10.1007/s11235-009-9276-4.2010

    Google Scholar 

  2. Dominguez, A.P.: Cryptanalysis of Parka’s authentication protocol in wireless mobile communication systems. International Journal of Network Security 3(3), 279–282 (2006)

    MathSciNet  Google Scholar 

  3. Hwang, M.-S.: Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology 48(5), 1469–1474 (1999)

    Article  Google Scholar 

  4. http://www.roggeweck.net/uploads/media/StudentGSM_Architecture.pdf

  5. Hwang, M.-S., Lee, C.-C., Lee, J.-Z.: A new anonymous channel protocol in wirelesscommunications. International Journal on Electronics and Communications 58(3), 218–222 (2004)

    Article  MathSciNet  Google Scholar 

  6. Kumar, K.P., Shailaja, G., Kavitha, A., Saxena, A.: Mutual authentication and key agreement for GSM. In: International Conference on Mobile Business, pp. 25–28 (June 2006)

    Google Scholar 

  7. Ammayappan, K., Saxena, A., Negi, A.: Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: International Conference on Advanced Computing and Communications, pp. 183–186 (December 2006)

    Google Scholar 

  8. Fanian, A., Berenjkoub, M., Gulliver, T.A.: A new mutual authentication protocol for GSM networks. In: Canadian Conference on Electrical and Computer Engineering, pp. 798–803 (May 2009)

    Google Scholar 

  9. Hahn, G., Kwon, T., Kim, S., Song, J.: Design and analysis of improved GSM authentication protocol for roaming users. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 451–458. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Kumar, K.P., Shailaja, G., Kavitha, A., Saxena, A.: Mutual authentication and key agreement for GSM. In: International Conference on Mobile Business, pp. 25–28 (June 2006)

    Google Scholar 

  11. Ammayappan, K., Saxena, A., Negi, A.: Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: International Conference on Advanced Computing and Communications, pp. 183–186 (2006)

    Google Scholar 

  12. Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195–197 (1981)

    Article  Google Scholar 

  13. May, P., Ehrlich, H.C., Steinke, T.: ZIB Structure Prediction Pipeline: Composing a Complex Biological Workflow through Web Services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  15. Czajkowski, K., Fitzgerald, S., Foster, I., Kesselman, C.: Grid Information Services for Distributed Resource Sharing. In: 10th IEEE International Symposium on High Performance Distributed Computing, pp. 181–184. IEEE Press, New York (2001)

    Chapter  Google Scholar 

  16. Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum, National Center for Biotechnology Information (2002), http://www.ncbi.nlm.nih.gov

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roy, T., Dutta, K. (2011). Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22543-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22542-0

  • Online ISBN: 978-3-642-22543-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics