Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0064

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication  

Abdelkader, Ghazli (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO))
Naima, Hadj Said (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO))
Adda, Ali Pacha (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO))
Publication Information
Journal of Information Processing Systems / v.13, no.1, 2017 , pp. 152-173 More about this Journal
Abstract
Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.
Keywords
Authentication; GSM; Location Update; Mobility Management; Paging; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. C. Lee, M. S. Hwang, and W. P. Yang, "Extension of authentication protocol for GSM," IEE Proceedings - Communications, vol. 150, no. 2, pp. 91-95, 2003.   DOI
2 W. D. Lin and J. K. Jan, "A wireless-based authentication and anonymous channels for large scale area," in Proceedings of the 6th IEEE Symposium on Computers and Communications (ISCC), Hammamet, Tunisia, 2001, pp. 36-41.
3 N. Saxena and N. S. Chaudhari, "Secure-AKA: an efficient AKA protocol for UMTS networks," Wireless Personal Communications, vol. 78, no. 2, pp. 1345-1373, 2014.   DOI
4 P. Ravi Kiran and Y. K. Sundara Krishna, "A study report on authentication protocols in GSM, GPRS and UMTS," International Journal of Engineering Research and Development, vol. 10, no. 6, pp. 42-48, 2014.
5 B. Sidhu and H. Singh, "Location management in cellular networks," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 1, no. 1, pp. 49-54, 2007.
6 EFORT, "GSM: Global System for Mobile Communications," 2008 [Online]. Available: http://www.efort.com.
7 J. A. P. Singh and M. Karnan, "A dynamic location management scheme for wirless networks using cascaded correlation neural network," International Journal of Computer Theory and Engineering, vol. 2, no. 4, pp 581-585, 2010.
8 J. W. Lee, "Mobility management using frequently visited location database," in Proceeding of International Conference on Multimedia and Ubiquitous Engineering (MUE), Seoul, Korea, 2007, pp. 159-163.
9 S. Wanke, H. Saito, Y. Arakawa, and S. Shimogawa, "User location in picocells: a paging algorithm derived from measured data," IEICE Transactions on Communications, vol. 93, no. 9, pp. 2291-2298, 2010.   DOI
10 C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for the mobile communications," Wireless Networks, vol. 5, no. 4, pp. 231-243, 1999.   DOI
11 L. Harn and H. Y. Lin," Modification to enhance the security of the GSM protocol," in Proceedings of the 5th National Conference on Information Security, Taipei, Taiwan, 1995, pp. 416-420.
12 A. Bar-Noy, I. Kessler, and M. Sidi, "Mobile users: to update or not to update?," Wireless Networks, vol. 1, no. 2, pp. 175-185, 1995.   DOI
13 A. Fanian, M. Berenjkoub, and T. A. Gulliver, "A new mutual authentication protocol for GSM networks," in Proceedings of Canadian Conference on Electrical and Computer Engineering, St. Johns, Canada, 2009, pp. 798-803.
14 J. Al-Saraireh and S. Yousef, "Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS)," International Journal of Theoretical and Applied Computer Sciences, vol. 1, no. 1, pp. 109-118, 2006.
15 G. K. Patnaik, "GSM mobility management," 2013 [Online]. Available: https://pt.scribd.com/document/271708186/GSM-Mobility-Management-pdf.
16 I. F. Akyildiz, J. McNair, J. S. M. Ho, H. Uzunalioglu, and W. Wang, "Mobility management in next-generation wireless systems," Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, 1999.   DOI
17 K. Al-Tawil, A. Akrami, and H. Youssef, "A new authentication protocol for GSM networks," in Proceedings of IEEE 23rd Annual Conference on Local Computer Networks, Boston, MA, 1998, pp. 21-30.
18 B. Mallinder, "An overview of the GSM system," in Proceedings of 3rd Nordic Seminar on Digital Land Mobile Radio Communication, Copenhagen, Denmark, 1998, pp. 12-15.
19 Y. Jie and D. J. Kadhim, "Performance evaluation of the mobility management towards 4G wireless networks," International Journal of Electronics and Communication Engineering & Technology, vol. 4, no. 5, pp. 1-10, 2013.
20 K. Ammayappan, A. Saxena, and A. Negi, "Mutual authentication and key agreement based on elliptic curve cryptography for GSM," in Proceedings of International Conference on Advanced Computing and Communication, Surathkal, India, 2006, pp. 183-186.
21 C. C. Lee, I. E. Liao, and M. S. Hwang, "An efficient authentication protocol for mobile communications," Telecommunication Systems, vol. 46, no. 1, pp. 31-41, 2011.   DOI
22 P. Acharya and S. S. Singh, "Mobile user's location management using bloom filter," International Journal of Computer Science and Information Technology, vol. 2, no. 3, pp. 1127-1130, 2011.
23 C. Selvan and R. Shanmugalakshmi, "Location management techniques to improve QoS in mobile networks using intelligent agent," International Journal on Computer Science and Engineering, vol. 3, no. 1, pp 192-198, 2011.
24 J. F. Stach, E. K. Park, and K. Makki, "Performance of an enhanced GSM protocol supporting non-repudiation of service," Computer Communications, vol. 22, no. 7, pp. 675-680, 1999.   DOI