Privacy and authentication protocol providing anonymous channels in GSM

被引:20
|
作者
Peinado, A [1 ]
机构
[1] Univ Malaga, ETS Ingn Telecomunicac, Dept Ingn Comunicac, E-29071 Malaga, Spain
关键词
authentication protocol; anonymous channels; wireless security;
D O I
10.1016/j.comcom.2004.05.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new efficient authentication protocol providing anonymous channels in the global system for mobile communications is presented, using algorithms A3, A5 and A8. The protocol is the result of a combination between the recent GSM authentication scheme proposed by Lee, Hwang and Yang (LHY) and the anonymous channel protocol presented by Lin and Jan (LJ). The result is a protocol with all the features of LHY scheme and the anonymity provided by LJ protocol. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:1709 / 1715
页数:7
相关论文
共 50 条
  • [31] On the Security of a Threshold Anonymous Authentication Protocol for VANETs
    Zhang, Jianhong
    Sun, Zhibin
    Liu, Shuai
    Liu, Pengyan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 145 - 155
  • [32] Anonymous Shared Certificate Entity Authentication Protocol
    Zhou, Jian
    Zhou, Xian-wei
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (04) : 2761 - 2772
  • [33] A NEW MUTUAL AUTHENTICATION PROTOCOL FOR GSM NETWORKS
    Fanian, Ali
    Berenjkoub, Mehdi
    Gulliver, T. Aaron
    2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 546 - +
  • [34] A more efficient authentication protocol for GSM networks
    Lee, WB
    Yeh, CK
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 511 - 515
  • [35] A new authentication protocol for GSM and UMTS networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    PROCEEDINGS OF THE 17TH IASTED INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, 2006, : 128 - +
  • [36] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [37] A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection
    Zhao, Xiao
    Cao, Suzhen
    Wang, Zheng
    Xing, Dandan
    Zhou, Dawei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 570 - 575
  • [38] Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET
    Rajasekaran, Arun Sekar
    Maria, Azees
    Al-Turjman, Fadi
    Altrjman, Chadi
    Mostarda, Leonardo
    DRONES, 2022, 6 (01)
  • [39] Lightweight Privacy and Confidentiality Preserving Anonymous Authentication Scheme for WBANs
    Subramani, Jegadeesan
    Maria, Azees
    Rajasekaran, Arun Sekar
    Al-Turjman, Fadi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3484 - 3491
  • [40] An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems
    Li, Wenmin
    Zhang, Shuo
    Su, Qi
    Wen, Qiaoyan
    Chen, Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,