A strong user authentication protocol for GSM
Selçuk, Ali Aydın
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE
150 - 153
Item Usage Stats
MetadataShow full item record
Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global Standards for Mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users. © 2005 IEEE.
Strong password protocols
Wireless network security
Cellular telephone systems
Security of data
Global system for mobile communications
Published Version (Please cite this version)http://dx.doi.org/10.1109/WETICE.2005.12
Showing items related by title, author, creator and subject.
Akar, N.; Hokelek I.; Atik, M.; Karasan, E. (Institute of Electrical and Electronics Engineers Inc., 2003)We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among ...
Zhang, Y.; Rangnekar, A.; Selçuk, Ali A.; Bicak, A.; Sidhu, D. (IEEE, 2003)With the current trend toward ubiquitous computing come wireless devices capable of forming the nodes of mobile ad hoc networks. Such networks typically rely on routing protocols in order to communicate messages from a ...
Yan, P.; Gao, Y.; Özbay, H. (Institute of Electrical and Electronics Engineers, 2005)It has been shown that the transmission control protocol (TCP) connections through the congested routers can be modeled as a feedback dynamic system. In this paper we design a variable structure (VS) based control scheme ...