2017
DOI: 10.3745/jips.03.0064
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

Abstract: Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process wher… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…This step is driven by the fact that mobile phones are the most ubiquitous communication devices in history [34], and mobile networks enjoy global coverage and are currently the most widely used network type [35]. Moreover, the vast majority of people now possess a mobile phone equipped with internet or network connectivity [36]. By taking this step, we've ensured that our work is highly versatile and can be utilized on a wide range of devices.…”
Section: Methodsmentioning
confidence: 99%
“…This step is driven by the fact that mobile phones are the most ubiquitous communication devices in history [34], and mobile networks enjoy global coverage and are currently the most widely used network type [35]. Moreover, the vast majority of people now possess a mobile phone equipped with internet or network connectivity [36]. By taking this step, we've ensured that our work is highly versatile and can be utilized on a wide range of devices.…”
Section: Methodsmentioning
confidence: 99%
“…To overcome this problem, it models a wireless channel with a discrete linear system and selects five indicators for identifying a wireless channel using a BPNN. Abdelkader et al [19] point out the weaknesses in the GSM authentication protocol that cause security issue, such as man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. Furthermore, they propose a secure authentication mechanism based a new mobility management method to improve location management in the GSM network.…”
mentioning
confidence: 99%