EEE-GSM: End-to-End Encryption Scheme over GSM System

GSM system is widely used by hundreds of millions of people. In fact there is no encryption scheme provides the reasonable security level (user-to-user encryption), it’s just provide the Air-interface encryption i.e. between the mobile station and the base station. Furthermore, there are other wireless links are vulnerable to attacks. It is therefore of great importance to provide reasonable security techniques to ensure the privacy of the mobile users especially circuit switching-based services, as well as prevent unauthorized use of the service. In this paper, a new approach is proposed to provide end-to-end encryption for the GSM system (EEE-GSM). This is achieved by using CL-PKC with some modifications and follow some assumptions in GSM system architecture in order to make the scheme compliant to the GSM cellular system. However, the proposed scheme not only efficient due to end-to-end security, but can also provide a secure system against IMSI catcher, man-in-the-middle, and replay attacks.

[1]  Alexander W. Dent,et al.  On Proofs of Security for Certificateless Cryptosystems , 2005, IACR Cryptol. ePrint Arch..

[2]  Luca Veltri,et al.  Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.

[3]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[4]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[5]  Fagen Li,et al.  User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System , 2016, Int. J. Netw. Secur..

[6]  Fagen Li,et al.  An efficient end-to-end mutual authentication scheme for 2G-GSM system , 2016, 2016 IEEE International Conference on Big Data Analysis (ICBDA).

[7]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.

[8]  S. Goswami,et al.  Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.

[9]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.

[10]  Fagen Li,et al.  Authentication and key agreement scheme for CDMA cellular system , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).

[11]  Alexander Maximov,et al.  An Improved Correlation Attack on A5/1 , 2004, Selected Areas in Cryptography.

[12]  Jan C. A. van der Lubbe,et al.  Basic Methods of Cryptography , 1998 .

[13]  Danfeng Yao,et al.  Applications and Security of Next-Generation, User-Centric Wireless Systems , 2010, Future Internet.

[14]  D. Drajic,et al.  Application-layer security mechanism for M2M communication over SMS , 2012, 2012 20th Telecommunications Forum (TELFOR).

[15]  Alberto Peinado,et al.  Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..

[16]  Zheng Wang,et al.  An improved attack on clock-controlled shift registers based on hardware implementation , 2012, Science China Information Sciences.

[17]  Francesco Vatalaro,et al.  Performance evaluation of GSM robustness against smart jamming attacks , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.