Aydemir, ÖzerSelçuk, Ali Aydın2016-02-082016-02-082005-06http://hdl.handle.net/11693/27349Date of Conference: 13-15 June 2005Conference name: 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global Standards for Mobile (GSM) which permits the use of weak secrets (e.g. passwords or PINs) for authentication, providing new flexibilities for the GSM users. © 2005 IEEE.EnglishGSMStrong password protocolsUser authenticationWireless network securityAuthentication protocolsPassword protocolsCellular telephone systemsCodes (symbols)Mobile computingNetwork protocolsSecurity of dataStandardsGlobal system for mobile communicationsA strong user authentication protocol for GSMConference Paper10.1109/WETICE.2005.12