Enhanced privacy and authentication for the global system for mobile communications View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

1999-07

AUTHORS

Chii‐Hwa Lee, Min‐Shiang Hwang, Wei‐Pang Yang

ABSTRACT

The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis. More... »

PAGES

231-243

References to SciGraph publications

Identifiers

URI

http://scigraph.springernature.com/pub.10.1023/a:1019103228471

DOI

http://dx.doi.org/10.1023/a:1019103228471

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1037184662


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan", 
          "id": "http://www.grid.ac/institutes/grid.260539.b", 
          "name": [
            "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lee", 
        "givenName": "Chii\u2010Hwa", 
        "id": "sg:person.07707133375.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07707133375.83"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hwang", 
        "givenName": "Min\u2010Shiang", 
        "id": "sg:person.016323640407.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016323640407.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan", 
          "id": "http://www.grid.ac/institutes/grid.260539.b", 
          "name": [
            "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yang", 
        "givenName": "Wei\u2010Pang", 
        "id": "sg:person.014374171260.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/978-0-387-34980-0_28", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1036007087", 
          "https://doi.org/10.1007/978-0-387-34980-0_28"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-0-387-34980-0_33", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1036743552", 
          "https://doi.org/10.1007/978-0-387-34980-0_33"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "1999-07", 
    "datePublishedReg": "1999-07-01", 
    "description": "The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security\u2010related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.", 
    "genre": "article", 
    "id": "sg:pub.10.1023/a:1019103228471", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1327893", 
        "issn": [
          "1022-0038", 
          "1572-8196"
        ], 
        "name": "Wireless Networks", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "4", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "5"
      }
    ], 
    "keywords": [
      "home location register", 
      "visitor location register", 
      "location register", 
      "mobile users", 
      "data confidentiality", 
      "mobile communications", 
      "improved authentication protocol", 
      "mobile network architecture", 
      "security-related issues", 
      "mobile station", 
      "location privacy", 
      "security requirements", 
      "authentication protocol", 
      "enhanced privacy", 
      "sensitive information", 
      "privacy protocols", 
      "security functions", 
      "confidentiality protocols", 
      "network architecture", 
      "storage space", 
      "global system", 
      "users", 
      "authentication", 
      "GSM system", 
      "privacy", 
      "confidentiality", 
      "architecture", 
      "communication", 
      "requirements", 
      "protocol", 
      "system", 
      "security", 
      "VLR", 
      "GSM", 
      "market demand", 
      "relevancy", 
      "information", 
      "capacity analysis", 
      "stations", 
      "method", 
      "performance", 
      "issues", 
      "space", 
      "demand", 
      "merits", 
      "Register", 
      "basis", 
      "function", 
      "analysis", 
      "approach", 
      "study", 
      "comparative basis"
    ], 
    "name": "Enhanced privacy and authentication for the global system for mobile communications", 
    "pagination": "231-243", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1037184662"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1023/a:1019103228471"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1023/a:1019103228471", 
      "https://app.dimensions.ai/details/publication/pub.1037184662"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-05-10T09:48", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/article/article_320.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1023/a:1019103228471"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'


 

This table displays all metadata directly associated to this object as RDF triples.

143 TRIPLES      22 PREDICATES      82 URIs      70 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1023/a:1019103228471 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:10
4 anzsrc-for:1005
5 schema:author N74a9947f2e0c48939a8326933b75431a
6 schema:citation sg:pub.10.1007/978-0-387-34980-0_28
7 sg:pub.10.1007/978-0-387-34980-0_33
8 schema:datePublished 1999-07
9 schema:datePublishedReg 1999-07-01
10 schema:description The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.
11 schema:genre article
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf Neaaf9afb6a8740d193cbc581447337de
15 Nf261af38678f4a5ca3289279699c76ff
16 sg:journal.1327893
17 schema:keywords GSM
18 GSM system
19 Register
20 VLR
21 analysis
22 approach
23 architecture
24 authentication
25 authentication protocol
26 basis
27 capacity analysis
28 communication
29 comparative basis
30 confidentiality
31 confidentiality protocols
32 data confidentiality
33 demand
34 enhanced privacy
35 function
36 global system
37 home location register
38 improved authentication protocol
39 information
40 issues
41 location privacy
42 location register
43 market demand
44 merits
45 method
46 mobile communications
47 mobile network architecture
48 mobile station
49 mobile users
50 network architecture
51 performance
52 privacy
53 privacy protocols
54 protocol
55 relevancy
56 requirements
57 security
58 security functions
59 security requirements
60 security-related issues
61 sensitive information
62 space
63 stations
64 storage space
65 study
66 system
67 users
68 visitor location register
69 schema:name Enhanced privacy and authentication for the global system for mobile communications
70 schema:pagination 231-243
71 schema:productId N614d003f1ab343ebae44d9b05e526565
72 Nff665027d90640fc976abca2a30ee618
73 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037184662
74 https://doi.org/10.1023/a:1019103228471
75 schema:sdDatePublished 2022-05-10T09:48
76 schema:sdLicense https://scigraph.springernature.com/explorer/license/
77 schema:sdPublisher N87293c2e28b542659a25fc5a48962d8b
78 schema:url https://doi.org/10.1023/a:1019103228471
79 sgo:license sg:explorer/license/
80 sgo:sdDataset articles
81 rdf:type schema:ScholarlyArticle
82 N614d003f1ab343ebae44d9b05e526565 schema:name doi
83 schema:value 10.1023/a:1019103228471
84 rdf:type schema:PropertyValue
85 N74a9947f2e0c48939a8326933b75431a rdf:first sg:person.07707133375.83
86 rdf:rest N9490354939fd40e5be604d8a62f2cbc7
87 N87293c2e28b542659a25fc5a48962d8b schema:name Springer Nature - SN SciGraph project
88 rdf:type schema:Organization
89 N9490354939fd40e5be604d8a62f2cbc7 rdf:first sg:person.016323640407.22
90 rdf:rest Ndcd18408454a482f8052be78fb7976ec
91 Ndcd18408454a482f8052be78fb7976ec rdf:first sg:person.014374171260.51
92 rdf:rest rdf:nil
93 Neaaf9afb6a8740d193cbc581447337de schema:volumeNumber 5
94 rdf:type schema:PublicationVolume
95 Nf261af38678f4a5ca3289279699c76ff schema:issueNumber 4
96 rdf:type schema:PublicationIssue
97 Nff665027d90640fc976abca2a30ee618 schema:name dimensions_id
98 schema:value pub.1037184662
99 rdf:type schema:PropertyValue
100 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
101 schema:name Information and Computing Sciences
102 rdf:type schema:DefinedTerm
103 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
104 schema:name Data Format
105 rdf:type schema:DefinedTerm
106 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
107 schema:name Technology
108 rdf:type schema:DefinedTerm
109 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
110 schema:name Communications Technologies
111 rdf:type schema:DefinedTerm
112 sg:journal.1327893 schema:issn 1022-0038
113 1572-8196
114 schema:name Wireless Networks
115 schema:publisher Springer Nature
116 rdf:type schema:Periodical
117 sg:person.014374171260.51 schema:affiliation grid-institutes:grid.260539.b
118 schema:familyName Yang
119 schema:givenName Wei‐Pang
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51
121 rdf:type schema:Person
122 sg:person.016323640407.22 schema:affiliation grid-institutes:None
123 schema:familyName Hwang
124 schema:givenName Min‐Shiang
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016323640407.22
126 rdf:type schema:Person
127 sg:person.07707133375.83 schema:affiliation grid-institutes:grid.260539.b
128 schema:familyName Lee
129 schema:givenName Chii‐Hwa
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07707133375.83
131 rdf:type schema:Person
132 sg:pub.10.1007/978-0-387-34980-0_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036007087
133 https://doi.org/10.1007/978-0-387-34980-0_28
134 rdf:type schema:CreativeWork
135 sg:pub.10.1007/978-0-387-34980-0_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036743552
136 https://doi.org/10.1007/978-0-387-34980-0_33
137 rdf:type schema:CreativeWork
138 grid-institutes:None schema:alternateName Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC
139 schema:name Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC
140 rdf:type schema:Organization
141 grid-institutes:grid.260539.b schema:alternateName Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan
142 schema:name Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan
143 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...