scispace - formally typeset
Proceedings ArticleDOI

Network impacts of privacy and authentication protocols for PCS

Seshadri Mohan
- Vol. 3, pp 1557-1561
Reads0
Chats0
TLDR
The message flow due to authentication, voice privacy, and signaling message encryption of two schemes that are expected to be incorporated in the EIA/TIA's cellular industry Interim Standard IS 41 Revision C are described and their impact on the traffic to network databases is studied.
Abstract
This paper describes the message flow due to authentication, voice privacy, and signaling message encryption of two schemes that are expected to be incorporated in the EIA/TIA's cellular industry Interim Standard IS 41 Revision C. We compare the two schemes with the use of a simple mobility model for users and study their impact on the traffic to network databases. Defining user mobility rate as the number of registrations per hour per user, we show that as the user mobility rate increases from roughly 0.5 to 15, the effectiveness of one of the schemes (the one that shares the shared secret data or SSD with the visited system) as compared to the other (the one that does not share it with the visited system) varies from about 66% improvement to about 30% degradation, clearly implying that the mobility characteristics of the user population dictate the choice of the authentication scheme.

read more

Citations
More filters
Patent

Method and apparatus for performing authentication in communication systems

TL;DR: In this paper, the authors propose a method and apparatus for permitting global roaming between two communication networks which utilize different authentication schemes, such as a triplet-based network and a shared secret data (SSD) network.
Patent

Method and apparatus for providing switch capability mediation in a mobile telephone system

TL;DR: In this paper, an improved home location register (HLR) that includes a switch capability mediation module for implementing switch capabilities mediation between different mobile switching centers (MSCs) is presented.
Patent

Method for adaptively switching between pcs authentication schemes

TL;DR: In this article, the automaton used in the invention has 2n states, running from 0 to 2n-1, and switching between authentication schemes increases the efficiency of the overall authentication functions in the mobile communication system thereby reducing the number of database accesses needed to authenticate a registration or a call.
Patent

Method and apparatus for providing fraud protection mediation in a mobile telephone system

James A. Lamb
TL;DR: In this article, the authors proposed an improved home location register (HLR) that includes a fraud protection mediation module for use in a mobile telephone system, which operates in any one of the following situations: (1) a registration notice (REGNOT) is received by the HLR from a mobile switching center (MSC) currently serving a subscriber in a roaming area; (2) a qualification request (QUALREQ) is receiving by the hlr from a serving MSC for obtaining a subscriber's profile; and (3) the Hlr sends a
Proceedings ArticleDOI

Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication

TL;DR: The design of the Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system is presented to provide a more secure registration and authentication service for mobile computing and wireless communication.
References
More filters

Two User Location Strategies for Personal Communications 3ervices

Seshadri Mohan, +1 more
TL;DR: The user location strategies specified in the IS-41 and GSM standards are described, and then, using a simple example, a simplified analysis of the database loads generated by each strategy is presented.
Journal ArticleDOI

Two user location strategies for personal communications services

TL;DR: In this paper, the authors introduce two two-level hierarchical strategies for locating users and provide a tutorial on their usage, and a simplified analysis of the database loads generated by each strategy is presented.
Related Papers (5)