A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks

GSM is the most popular standard for wireless cellular networks with 3 billion handsets in use worldwide. One of the critical components in the GSM architecture is the authentication protocol. The current protocol has several drawbacks such as one- way entity authentication, memory overhead in the VLR and bandwidth consumption between the HLR and VLR. Several solutions have been proposed to establish mutual entity authentication and to improve performance. However, they either cannot provide flaw-free bilateral entity authentication or impose more network overhead. In this paper, we propose a new approach to mutual entity authentication based on symmetric polynomials. In the proposed protocol, each MS is allocated a share of the symmetric polynomial during initial authentication. In subsequent authentication requests, the MS and VLR authenticate each other using the polynomial share. The proposed solution not only provides secure bilateral authentication, but also decreases the memory overhead in the VLR and the required connection bandwidth.

[1]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[2]  P. Borwein,et al.  Polynomials and Polynomial Inequalities , 1995 .

[3]  Alberto Peinado,et al.  Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..

[4]  Jinn-ke Jan,et al.  A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[5]  E. K. Park,et al.  Performance of an enhanced GSM protocol supporting non-repudiation of service , 1999, Comput. Commun..

[6]  Vladimir Cretu,et al.  Threats and Countermeasures in GSM Networks , 2006, J. Networks.

[7]  Ali Aydin Selçuk,et al.  A strong user authentication protocol for GSM , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[8]  Kai Schramm DES Sidechannel Collision Attacks On Smartcard Implementations , 2002 .

[9]  Vladimir Cretu,et al.  Mitigating denial of service threats in GSM networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[10]  Chin-Chen Chang,et al.  Efficient authentication protocols of GSM , 2005, Comput. Commun..

[11]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[12]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[13]  Mischa Schwartz,et al.  Mobile Wireless Communications: Access and scheduling techniques in cellular systems , 2004 .

[14]  Khalid Al-Tawil,et al.  A new authentication protocol for GSM networks , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[15]  Dan Brown,et al.  Techniques for privacy and authentication in personal communication systems , 1995, IEEE Wirel. Commun..

[16]  Colin Blanchard Security for the Third Generation (3G) Mobile System , 2000, Inf. Secur. Tech. Rep..

[17]  Cheng-Chi Lee,et al.  Extension of authentication protocol for GSM , 2003 .

[18]  Mehdi Berenjkoub,et al.  A TESLA-based mutual authentication protocol for GSM networks , 2009, ISC Int. J. Inf. Secur..