Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: An Optimal Mutual Authentication Scheme in GSM Networks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
An Optimal Mutual Authentication Scheme in GSM Networks


[attachment=21970]

INTRODUCTION
Mobile communication systems are very famous, widely
and commonly used among people all over the world. They
facilitate users with wireless communication accessible
virtually everywhere. Global System for Mobile
communication (GSM) is the most commonly used second
generation (2G) technology among mobile users. More than
80% of whole mobile subscribers worldwide are using GSM. It
was introduced in early 1990’s to replace numerous
incompatible cellular networks operating in Europe [1].



OPTIMAL MUTUAL AUTHENTICATION IN GSM
We have proposed a new optimal mutual authentication and
ciphering key generation scheme in GSM. In this scheme, we
have focused on eliminating above discussed problems of
existing schemes, minimizing computation overhead of MS,
reducing public private key pairs, and strengthening network
authentication.
Same three entities MS, MSC/VLR and AuC/HLR are used
with three public/private key pairs for secure communication as
shown in Fig. 8. Although M_H_pub is a public key, it is still
kept secret. It enhances message security helps in validating the
VLR.



ADVANTAGES OF PROPOSED SCHEME
In this proposed mechanism, computation overhead of MS
is reduced by shifting the responsibility of Kc generation to
HLR. By using this approach, there is no need of storing
authentication algorithm A3 in SIM. Public and private key
pairs are reduced to three by omitting MS-VLR link keys. By
doing this, key management is also made simpler and storage
requirements at VLR remain at minimum. VLR is not trusted
until it is not authenticated by HLR. Use of public private key
pairs eliminates the possibility of man-in-middle attacks.



CONCLUSION
Wireless communication has provided great features in
terms of mobility and ease of use. Starting from voice
communication, it is now supporting m-commerce and other
financial services. Before initiating communication, a mutual
authentication is necessary. Multiple authentication techniques
are presented with different design goals including security,
mutual authentication, and reduction in signaling overhead.