93 / 2016-01-09 21:55:26
An efficient end-to-end mutual authentication scheme for 2G-GSM system
2G-GSM Security,GSM Mutual Authentication,CL-PKC
全文录用
Mohammed Mohammed / UESTC
The security architecture of the mobile networks provides different security features such as authentication, confidentiality, and integrity for both users and network operator. Moreover, the security of mobile communications becomes a hot topic and always need security improvements. GSM cellular system has many weaknesses, especially in the authentication process due to the lack of the physical protection mechanisms in both user and network sides. This paper analyses an existing GSM authentication scheme based on CL-PKC which was proposed in 2014, and it has many weaknesses since it used the basic CL-PKC scheme which has many weaknesses itself. And this paper also proposes an efficient end-to-end scheme for GSM mutual authentication using the concept of a secure CL-PKC, with some modifications in both security and GSM network architectures.
重要日期
  • 会议日期

    03月25日

    2016

    03月26日

    2016

  • 09月01日 2015

    提前注册日期

  • 12月31日 2015

    终稿截稿日期

  • 03月26日 2016

    注册截止日期

联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询