2010
DOI: 10.1007/s11235-009-9276-4
|View full text |Cite
|
Sign up to set email alerts
|

An efficient authentication protocol for mobile communications

Abstract: In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) not supporting bilateral authentication. The main contribution of this paper is that it does not only improve the draw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…Retrofitting Mutual Authentication to GSM [117], [118], [119], [120], [121], [ ? unknown not deployed or deployable partially deployed deployed and known to work from at least one Carrier or by Leaky Implementations, which means that sensitive information can be accessed through unintended side channels.…”
Section: Systematization Overviewmentioning
confidence: 99%
“…Retrofitting Mutual Authentication to GSM [117], [118], [119], [120], [121], [ ? unknown not deployed or deployable partially deployed deployed and known to work from at least one Carrier or by Leaky Implementations, which means that sensitive information can be accessed through unintended side channels.…”
Section: Systematization Overviewmentioning
confidence: 99%
“…The method represents a great reduction in location update and paging costs. Stephan et al [17] in 2010, proposed a new mechanism that registers the location of the mobile station when it resides for a long fixed time in the cell. The mobile station location management scheme was proposed by Jie and Kadhim [14] in 2013, based on the history of movement.…”
Section: Limits Of Mobility Management and The Authentication Mechanimentioning
confidence: 99%
“…The security and efficiency problems of satellite authentication schemes have motivated us to develop a secure and efficient authentication protocol that is more suitable for mobile satellite communication systems. In general, a secure authentication scheme for satellite communication systems should satisfy the following security requirements : (1) resistance against impersonation attack . A server or a user must have the ability to verify whether the login request is sent from an adversary; (2) resistance against denial of service (DoS) attack .…”
Section: Introductionmentioning
confidence: 99%
“…An adversary who has learned all of the previous authentication messages may attempt to resend these messages during additional authentication processes. In addition, a strong authentication scheme should provide the following functional requirements : (1) provision of mutual authentication . A strong authentication scheme must allow users and servers to authenticate each other; (2) provision of user anonymity .…”
Section: Introductionmentioning
confidence: 99%