21-07-2012, 02:51 PM
An Optimal Mutual Authentication Scheme in GSM Networks
An Optimal Mutual Authentication.pdf (Size: 212.23 KB / Downloads: 97)
INTRODUCTION
Mobile communication systems are very famous, widely
and commonly used among people all over the world. They
facilitate users with wireless communication accessible
virtually everywhere. Global System for Mobile
communication (GSM) is the most commonly used second
generation (2G) technology among mobile users. More than
80% of whole mobile subscribers worldwide are using GSM. It
was introduced in early 1990’s to replace numerous
incompatible cellular networks operating in Europe [1].
RELATED WORK
In this section, we have briefly discussed some of the latest
GSM authentication schemes with their weaknesses from
existing literature. Main entities involved in authentication
process are MS, MSC/VLR and AuC/HLR as represented in
Fig. 2. MS communicates with MSC which coordinates with
VLR and contacts AuC and HLR for authentication [1, 2, 3, 6].
In traditional authentication process, MS sends Temporary
mobile subscriber identity (TMSI) to MSC/VLR [3]. MS sends
its real identity IMSI only once when it is switched on. After
that a temporary identity TMSI is assigned to it for further use.
MSC/VLR extracts its real identity IMSI and sends it to
AuC/HLR.
OPTIMAL MUTUAL AUTHENTICATION IN GSM
We have proposed a new optimal mutual authentication and
ciphering key generation scheme in GSM. In this scheme, we
have focused on eliminating above discussed problems of
existing schemes, minimizing computation overhead of MS,
reducing public private key pairs, and strengthening network
authentication.
Same three entities MS, MSC/VLR and AuC/HLR are used
with three public/private key pairs for secure communication as
shown in Fig. 8. Although M_H_pub is a public key, it is still
kept secret. It enhances message security helps in validating the
VLR.
ADVANTAGES OF PROPOSED SCHEME
In this proposed mechanism, computation overhead of MS
is reduced by shifting the responsibility of Kc generation to
HLR. By using this approach, there is no need of storing
authentication algorithm A3 in SIM. Public and private key
pairs are reduced to three by omitting MS-VLR link keys. By
doing this, key management is also made simpler and storage
requirements at VLR remain at minimum. VLR is not trusted
until it is not authenticated by HLR. Use of public private key
pairs eliminates the possibility of man-in-middle attacks.
CONCLUSION
Wireless communication has provided great features in
terms of mobility and ease of use. Starting from voice
communication, it is now supporting m-commerce and other
financial services. Before initiating communication, a mutual
authentication is necessary. Multiple authentication techniques
are presented with different design goals including security,
mutual authentication, and reduction in signaling overhead. In
this paper, we have proposed a new mutual authentication
mechanism using asymmetric cryptography with focus on
minimizing computation overhead and strengthening the
authentication along with eliminating problems of existing
schemes.