Abstract/Description
GSM is one of the most dominating networks for wireless mobile communication. With the passage of time, financial institutions have started using this network for providing their services. Beginning from basic services like balance enquiry, the trend is increasing to provide financial transactions on mobile. This trend establishes the need of strengthening user authentication and requirement of network authentication as well. In this paper, we have proposed a mutual authentication approach using asymmetric cryptography. In the proposed technique, user and network are authenticated with minimal computation and signaling overhead.
Keywords
Asymmetric cryptography, AuC, Authentication, GSM, HLR, MS, MSC, VLR
Location
Room C4
Session Theme
Networks - I
Session Type
Other
Session Chair
Dr. Sayeed Ghani
Start Date
23-7-2011 2:15 PM
End Date
23-7-2011 2:35 PM
Recommended Citation
Haleem, A., & Usman, M. (2011). Networks - I: An optimal mutual authentication scheme in GSM networks. International Conference on Information and Communication Technologies. Retrieved from https://ir.iba.edu.pk/icict/2011/2011/6
Networks - I: An optimal mutual authentication scheme in GSM networks
Room C4
GSM is one of the most dominating networks for wireless mobile communication. With the passage of time, financial institutions have started using this network for providing their services. Beginning from basic services like balance enquiry, the trend is increasing to provide financial transactions on mobile. This trend establishes the need of strengthening user authentication and requirement of network authentication as well. In this paper, we have proposed a mutual authentication approach using asymmetric cryptography. In the proposed technique, user and network are authenticated with minimal computation and signaling overhead.