Providing anonymous channels and mutual authentication for mobile communications

Bo Li, Chin Chen Chang, Jung San Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

So far, engineers have proposed many authentication protocols to repair drawbacks of GSM system. Among them, Peinado's method can solve those and provide an anonymous channel for mobile users; an intruder therefore is unable to trace the identity and the location of the user. However, we find that authenticating VLR does not be performed at the first time when MS joins into a new visiting VLR to ask for communication service. We consequently propose a novel version which mutual authentication between VLR and MS is ensured at anytime. In particular, computation loads of MS and VLR can be decreased by 10% for confirming mutual authentication in Ticket Utilization Phase in comparison with Peinado's method.

Original languageEnglish (US)
Title of host publicationProceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010
Pages618-621
Number of pages4
DOIs
StatePublished - 2010
Externally publishedYes
Event4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010 - Shenzhen, China
Duration: Dec 13 2010Dec 15 2010

Publication series

NameProceedings - 4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010

Other

Other4th International Conference on Genetic and Evolutionary Computing, ICGEC 2010
Country/TerritoryChina
CityShenzhen
Period12/13/1012/15/10

Keywords

  • Anonymity
  • Authentication
  • GSM
  • Mobile communication
  • PCS
  • Privacy

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Providing anonymous channels and mutual authentication for mobile communications'. Together they form a unique fingerprint.

Cite this