scispace - formally typeset
Proceedings ArticleDOI

A new authentication protocol for roaming users in GSM networks

TLDR
This paper study and analyze the GSM authentication protocols for roaming users, and propose a new scheme with less signaling traffic and better call set-up time.
Abstract
Communicating while we are moving has been a desire for a long time. With mobile communication systems, mobile users can make and receive calls while they are moving independent of time, location and network access. One of the most attractive features that came with the Global System for Mobile communication (GSM) is roaming. Wireless systems are more vulnerable to fraudulent access and eavesdropping. As a remedy for that, GSM gives more importance to the user's privacy and authentication process. Although the process gives a reasonable security level, it overloads the network with significant signaling traffic and increases the call set-up time. The signaling load and the authentication delay are of particular importance and have become the subject of widespread research interest. In this paper, we study and analyze the GSM authentication protocols for roaming users, and propose a new scheme with less signaling traffic and better call set-up time.

read more

Citations
More filters
Patent

Method and apparatus for security in a data processing system

TL;DR: In this paper, each user is provided a registration key, and a long-time updated broadcast key is encrypted using the registration key and provided periodically to a user, where the user decrypts the broadcast message using the short time key.
Journal ArticleDOI

A simulated annealing approach for mobile location management

TL;DR: The proposed approach integrates the location areas scheme into the simulated annealing algorithm to find optimal configurations for a range of test networks and provides new insight into the mobility management problem.
Patent

Secure registration for a multicast-broadcast-multimedia system (MBMS)

TL;DR: In this paper, a method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed, where a random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN).
Patent

Method and system for providing sim-based roaming over existing wlan public access infrastructure

TL;DR: In this article, a method and apparatus for SIM-based authentication and authorization in a WLAN Internet Service Provider (WISP) network supporting the universal access method (UAM) of authentication, enabling roaming for customers of mobile service providers onto said networks.
Proceedings ArticleDOI

A genetic algorithm for finding optimal location area configurations for mobility management

TL;DR: This work presents a new approach to solve the location management problem by using the location areas approach, where a modified genetic algorithm is used to find the optimal configuration of location areas in a mobile network.
References
More filters
Journal ArticleDOI

Overview of the GSM system and protocol architecture

TL;DR: The global system for mobile telecommunications (GSM), which provides terminal mobility, with personal mobility provided through the insertion of a subscriber identity module (SIM) into the GSM network, is discussed.
Journal ArticleDOI

Teletraffic modeling for personal communications services

TL;DR: A realistic teletraffic modeling framework for personal communications services that captures complex human behaviors and has been validated through analysis of actual call and mobility data is presented.
Journal ArticleDOI

Privacy and authentication on a portable communications system

TL;DR: Public-key/private-key hybrid key agreements and authentication protocols which maintain privacy of conversation and location information, and deter usage fraud, are presented, and the tradeoffs are discussed.
Journal ArticleDOI

Authentication of mobile users

TL;DR: The goal of the paper is to propose a general approach for the authentication of users in remote domains while maintaining strict separation of security domains.
Journal ArticleDOI

An overview of wireless broadband communications

TL;DR: An analysis of the propagation aspects at the bands foreseen for wireless broadband communication systems-microwaves, millimeter waves and infrared-is presented, also addressing the issue of the antennas and batteries.
Related Papers (5)