Enhanced privacy and authentication for the global system for mobile communications

被引:51
作者
Lee, CH [1 ]
Hwang, MS
Yang, WP
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
[2] Chao Yang Univ Technol, Dept Informat Management, Taichung, Taiwan
关键词
Mobile Communication; Mobile Station; Mobile User; Mobile Network; Security Requirement;
D O I
10.1023/A:1019103228471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security-related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.
引用
收藏
页码:231 / 243
页数:13
相关论文
共 29 条
[1]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[2]  
Aziz A, 1994, IEEE PERS COMMUN, P25
[3]  
Beheim J., 1994, Telcom Report International, V17, P31
[4]   PRIVACY AND AUTHENTICATION ON A PORTABLE COMMUNICATIONS-SYSTEM [J].
BELLER, MJ ;
CHANG, LF ;
YACOBI, Y .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (06) :821-829
[5]  
BHARGHAVAN V, 1994, ACM C COMP COMM SEC, P10
[6]  
BROWN D, 1995, IEEE PERSONAL CO AUG, P6
[7]  
CARLSEN U, 1994, ACM OPERATING SYSTEM, V28, P16
[8]  
DECHAUX C, 1993, ELECTR COMMUN, P118
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
FRANKEL Y, 1995, COMMUNICATION AUG, P16