A new authentication protocol for GSM and UMTS networks

Mobile phones are rapidly becoming one of the most popular tools for communication. The rapid growth of wireless technology and the increasing use of such technologies in coordination with the internet require a very careful look at the issue of security. Security, Authentication, Encryption and Access Control are vital features that must be present in any communication network.In our paper we will investigate the existing authentication mechanisms for mobile communications and analyses these mechanisms as a step to propose enhancement to authentication. Specifically, the authentication signalling in GSM and UMTS mobile networks is minimized, and consequently the bottleneck at authentication centre is avoided, by reducing the number of messages between mobile and authentication centre (i.e. reducing the procedures of authentication), and then reducing the authentication times, setup time and data sizes. The replay attacks and guessing attack are infeasible because the subscriber uses different key to request for authentication.

[1]  Khalid Al-Tawil,et al.  A new authentication protocol for GSM networks , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[2]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[3]  Hung-Yu Lin Security and authentication in PCS , 1999 .

[4]  Michael Walker On the Security of 3GPP Networks , 2000, EUROCRYPT.

[5]  M. Walker,et al.  Towards a coherent approach to third generation system security , 2001 .

[6]  Roy H. Campbell,et al.  A lightweight reconfigurable security mechanism for 3G/4G mobile devices , 2001, IEEE Wirel. Commun..

[7]  Sarvar Patel,et al.  Efficient authentication and key distribution in wireless IP networks , 2003, IEEE Wireless Communications.

[8]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).