scispace - formally typeset
Open AccessDOI

A TESLA-Based Mutual Authentication Protocol for GSM Networks

TLDR
This paper proposes a novel mutual entity authentication using the TESLA protocol that not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth.
Abstract
A B S T R A C T The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a aw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

read more

Citations
More filters
Journal ArticleDOI

A Survey of Man In The Middle Attacks

TL;DR: This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
Journal ArticleDOI

A secure mutual authentication scheme with non‐repudiation for vehicular ad hoc networks

TL;DR: The proposed scheme is proved to achieve the requirements of resist known attacks, non‐repudiation, authentication, availability, integrity, and confidentiality and can resist malicious attacks or prevent illegal users' access via security and performance analysis.
Journal ArticleDOI

A symmetric polynomial-based mutual authentication protocol for GSM networks

TL;DR: This paper proposes a new approach to mutual entity authentication based on symmetric polynomials that not only provides secure bilateral authentication, but also decreases the memory overhead in the VLR and the required connection bandwidth.
Dissertation

Improving security and privacy in current mobile systems

TL;DR: This thesis describes a novel modification to the relationship between a subscriber identity module (SIM) and its home network which allows mutual authentication without affecting the GSM infrastructure, including the phones; the only necessary changes are to the authentication centres and the SIMs.
Proceedings ArticleDOI

Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSM

TL;DR: A HMAC based mutual authentication and key agreement protocol for GSM is proposed to avoid false base station attack and the correctness of the protocol is verified by using Prove if.
References
More filters

The TESLA Broadcast Authentication Protocol

TL;DR: The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss.
Book

The official PGP user's guide

TL;DR: This tutorial discusses how public key cryptography works installing PGP using PGP managing keys advanced topics beware of snake oil and a peek under the hood vulnerabilities.
Journal ArticleDOI

Overview of the GSM system and protocol architecture

TL;DR: The global system for mobile telecommunications (GSM), which provides terminal mobility, with personal mobility provided through the insertion of a subscriber identity module (SIM) into the GSM network, is discussed.
Book

Mobile Wireless Communications

TL;DR: This paper presents a meta-analysis of the 3.5G/3G mobile wireless systems: packet-switched data, access and scheduling techniques in cellular systems, and second-generation, digital, wireless systems.