1998
DOI: 10.1109/5.681375
|View full text |Cite
|
Sign up to set email alerts
|

Mobility and security management in the GSM system and some proposed future improvements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
20
0

Year Published

2003
2003
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 6 publications
0
20
0
Order By: Relevance
“…The proposed authentication protocols use the temporary identity (TID) for a mobile user instead of his real one. TID is prearranged and distributed by the home network H in advance or temporarily generated by encrypting the real identity [12], [13], [14], [15], [16]. The key exchange renews a mobile users session key for each session, and therefore, reduces the risk of using a compromised session key to communicate with visited networks.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed authentication protocols use the temporary identity (TID) for a mobile user instead of his real one. TID is prearranged and distributed by the home network H in advance or temporarily generated by encrypting the real identity [12], [13], [14], [15], [16]. The key exchange renews a mobile users session key for each session, and therefore, reduces the risk of using a compromised session key to communicate with visited networks.…”
Section: Introductionmentioning
confidence: 99%
“…This requires that the security management is both efficient and effective when users change from one service to another. There have been several proposals relating to M-service systems [1], [5]- [7]. Probably it is accurate to say that most of them lack the required flexibility in security management.…”
Section: Introductionmentioning
confidence: 99%
“…The global system for mobile communication [1] provides mechanisms for user authentication as well as integrity and confidentiality, including protection of information exchanged between mobile terminals and fixed networks. It provides only limited privacy protection for users by hiding their real identities from eavesdroppers on the radio interface [7].…”
Section: Introductionmentioning
confidence: 99%
“…For allowing people to get connected seamlessly using their mobile devices without being limited by the geographical coverage of their own home networks, roaming services have been deployed, for example, GMS [6][7][8][9], 3GPP [10], and WLANs. A typical roaming scenario involves three parties: a roaming Mobile Station (MS), a Visited Location Register (VLR) and a Home Location Register (HLR).…”
Section: Introductionmentioning
confidence: 99%