Robust Delegation Signcrypted Authentication Protocol against FHLR Attack in 3GPP Wireless Communications

In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also presents an enhanced protocol, which is not only has the same security properties as the original protocol, but also avoids the weakness in the original protocol. Therefore this scheme enjoys both computational and communicational efficiency.

[1]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[2]  A. Mehrotra,et al.  Mobility and security management in the GSM system and some proposed future improvements , 1998, Proc. IEEE.

[3]  Li-Fung Chang,et al.  Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.

[4]  Lein Harn,et al.  Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.

[5]  Tzonelih Hwang,et al.  Private Authentication Techniques for the Global Mobility Network , 2005, Wirel. Pers. Commun..

[6]  Yuliang Zheng,et al.  Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.

[7]  Hung-Yu Lin Security and authentication in PCS , 1999 .

[8]  Dapeng Wu,et al.  An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.

[9]  Qi He,et al.  The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.

[10]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[11]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[12]  Khalid Al-Tawil,et al.  A new authentication protocol for GSM networks , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[13]  Wei-Bin Lee,et al.  A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.

[14]  Tzonelih Hwang,et al.  Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.

[15]  C.-H. Wu,et al.  Localised authentication for inter-network roaming across wireless LANs , 2004 .