A strong user authentication protocol for GSM
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
150 - 153
Item Usage Stats
Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global Standards for Mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users. © 2005 IEEE.
Strong password protocols
Wireless network security
Cellular telephone systems
Security of data
Global system for mobile communications
Published Version (Please cite this version)http://dx.doi.org/10.1109/WETICE.2005.12
Showing items related by title, author, creator and subject.
Akar, Nail; Hokelek, İbrahim; Atik, Muammer; Karasan, Ezhan (IEEE, 2003-10)We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among ...
Zhang, Y.; Rangnekar, A.; Selçuk, Ali A.; Bicak, A.; Sidhu, D. (IEEE, 2003)With the current trend toward ubiquitous computing come wireless devices capable of forming the nodes of mobile ad hoc networks. Such networks typically rely on routing protocols in order to communicate messages from a ...
Rangnekar, A.; Zhang, Y.; Selçuk, Ali A.; Bicak, A.; Devarapalli V.; Sidhu, D. (IEEE, 2003)This paper proposes a new multicast protocol for mobile ad hoc networks (MANETs). The proposed protocol, Shared-Tree MZR, is a shared tree variant of the Multicast Routing Protocol based on Zone Routing (MZR). The concept ...