DOI QR코드

DOI QR Code

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO)) ;
  • Naima, Hadj Said (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO)) ;
  • Adda, Ali Pacha (Dept. of Mathematics and Computer Science, University of Science and Technology (USTO))
  • Received : 2015.07.27
  • Accepted : 2016.01.06
  • Published : 2017.02.28

Abstract

Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

Keywords

References

  1. B. Sidhu and H. Singh, "Location management in cellular networks," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 1, no. 1, pp. 49-54, 2007.
  2. EFORT, "GSM: Global System for Mobile Communications," 2008 [Online]. Available: http://www.efort.com.
  3. G. K. Patnaik, "GSM mobility management," 2013 [Online]. Available: https://pt.scribd.com/document/271708186/GSM-Mobility-Management-pdf.
  4. J. W. Lee, "Mobility management using frequently visited location database," in Proceeding of International Conference on Multimedia and Ubiquitous Engineering (MUE), Seoul, Korea, 2007, pp. 159-163.
  5. S. Wanke, H. Saito, Y. Arakawa, and S. Shimogawa, "User location in picocells: a paging algorithm derived from measured data," IEICE Transactions on Communications, vol. 93, no. 9, pp. 2291-2298, 2010. https://doi.org/10.1587/transcom.E93.B.2291
  6. C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for the mobile communications," Wireless Networks, vol. 5, no. 4, pp. 231-243, 1999. https://doi.org/10.1023/A:1019103228471
  7. J. A. P. Singh and M. Karnan, "A dynamic location management scheme for wirless networks using cascaded correlation neural network," International Journal of Computer Theory and Engineering, vol. 2, no. 4, pp 581-585, 2010.
  8. A. Bar-Noy, I. Kessler, and M. Sidi, "Mobile users: to update or not to update?," Wireless Networks, vol. 1, no. 2, pp. 175-185, 1995. https://doi.org/10.1007/BF01202540
  9. A. Fanian, M. Berenjkoub, and T. A. Gulliver, "A new mutual authentication protocol for GSM networks," in Proceedings of Canadian Conference on Electrical and Computer Engineering, St. Johns, Canada, 2009, pp. 798-803.
  10. J. Al-Saraireh and S. Yousef, "Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS)," International Journal of Theoretical and Applied Computer Sciences, vol. 1, no. 1, pp. 109-118, 2006.
  11. L. Harn and H. Y. Lin," Modification to enhance the security of the GSM protocol," in Proceedings of the 5th National Conference on Information Security, Taipei, Taiwan, 1995, pp. 416-420.
  12. K. Al-Tawil, A. Akrami, and H. Youssef, "A new authentication protocol for GSM networks," in Proceedings of IEEE 23rd Annual Conference on Local Computer Networks, Boston, MA, 1998, pp. 21-30.
  13. B. Mallinder, "An overview of the GSM system," in Proceedings of 3rd Nordic Seminar on Digital Land Mobile Radio Communication, Copenhagen, Denmark, 1998, pp. 12-15.
  14. Y. Jie and D. J. Kadhim, "Performance evaluation of the mobility management towards 4G wireless networks," International Journal of Electronics and Communication Engineering & Technology, vol. 4, no. 5, pp. 1-10, 2013.
  15. K. Ammayappan, A. Saxena, and A. Negi, "Mutual authentication and key agreement based on elliptic curve cryptography for GSM," in Proceedings of International Conference on Advanced Computing and Communication, Surathkal, India, 2006, pp. 183-186.
  16. I. F. Akyildiz, J. McNair, J. S. M. Ho, H. Uzunalioglu, and W. Wang, "Mobility management in next-generation wireless systems," Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, 1999. https://doi.org/10.1109/5.775420
  17. C. C. Lee, I. E. Liao, and M. S. Hwang, "An efficient authentication protocol for mobile communications," Telecommunication Systems, vol. 46, no. 1, pp. 31-41, 2011. https://doi.org/10.1007/s11235-009-9276-4
  18. P. Acharya and S. S. Singh, "Mobile user's location management using bloom filter," International Journal of Computer Science and Information Technology, vol. 2, no. 3, pp. 1127-1130, 2011.
  19. C. Selvan and R. Shanmugalakshmi, "Location management techniques to improve QoS in mobile networks using intelligent agent," International Journal on Computer Science and Engineering, vol. 3, no. 1, pp 192-198, 2011.
  20. J. F. Stach, E. K. Park, and K. Makki, "Performance of an enhanced GSM protocol supporting non-repudiation of service," Computer Communications, vol. 22, no. 7, pp. 675-680, 1999. https://doi.org/10.1016/S0140-3664(99)00010-9
  21. C. C. Lee, M. S. Hwang, and W. P. Yang, "Extension of authentication protocol for GSM," IEE Proceedings - Communications, vol. 150, no. 2, pp. 91-95, 2003. https://doi.org/10.1049/ip-com:20030290
  22. W. D. Lin and J. K. Jan, "A wireless-based authentication and anonymous channels for large scale area," in Proceedings of the 6th IEEE Symposium on Computers and Communications (ISCC), Hammamet, Tunisia, 2001, pp. 36-41.
  23. N. Saxena and N. S. Chaudhari, "Secure-AKA: an efficient AKA protocol for UMTS networks," Wireless Personal Communications, vol. 78, no. 2, pp. 1345-1373, 2014. https://doi.org/10.1007/s11277-014-1821-0
  24. P. Ravi Kiran and Y. K. Sundara Krishna, "A study report on authentication protocols in GSM, GPRS and UMTS," International Journal of Engineering Research and Development, vol. 10, no. 6, pp. 42-48, 2014.