Ontology type: schema:ScholarlyArticle
1999-07
AUTHORSChii‐Hwa Lee, Min‐Shiang Hwang, Wei‐Pang Yang
ABSTRACTThe Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis. More... »
PAGES231-243
http://scigraph.springernature.com/pub.10.1023/a:1019103228471
DOIhttp://dx.doi.org/10.1023/a:1019103228471
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1037184662
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Technology",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Communications Technologies",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan",
"id": "http://www.grid.ac/institutes/grid.260539.b",
"name": [
"Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan"
],
"type": "Organization"
},
"familyName": "Lee",
"givenName": "Chii\u2010Hwa",
"id": "sg:person.07707133375.83",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07707133375.83"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC"
],
"type": "Organization"
},
"familyName": "Hwang",
"givenName": "Min\u2010Shiang",
"id": "sg:person.016323640407.22",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016323640407.22"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan",
"id": "http://www.grid.ac/institutes/grid.260539.b",
"name": [
"Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan"
],
"type": "Organization"
},
"familyName": "Yang",
"givenName": "Wei\u2010Pang",
"id": "sg:person.014374171260.51",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/978-0-387-34980-0_28",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1036007087",
"https://doi.org/10.1007/978-0-387-34980-0_28"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-34980-0_33",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1036743552",
"https://doi.org/10.1007/978-0-387-34980-0_33"
],
"type": "CreativeWork"
}
],
"datePublished": "1999-07",
"datePublishedReg": "1999-07-01",
"description": "The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security\u2010related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis.",
"genre": "article",
"id": "sg:pub.10.1023/a:1019103228471",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1327893",
"issn": [
"1022-0038",
"1572-8196"
],
"name": "Wireless Networks",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "4",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "5"
}
],
"keywords": [
"home location register",
"visitor location register",
"location register",
"mobile users",
"data confidentiality",
"mobile communications",
"improved authentication protocol",
"mobile network architecture",
"security-related issues",
"mobile station",
"location privacy",
"security requirements",
"authentication protocol",
"enhanced privacy",
"sensitive information",
"privacy protocols",
"security functions",
"confidentiality protocols",
"network architecture",
"storage space",
"global system",
"users",
"authentication",
"GSM system",
"privacy",
"confidentiality",
"architecture",
"communication",
"requirements",
"protocol",
"system",
"security",
"VLR",
"GSM",
"market demand",
"relevancy",
"information",
"capacity analysis",
"stations",
"method",
"performance",
"issues",
"space",
"demand",
"merits",
"Register",
"basis",
"function",
"analysis",
"approach",
"study",
"comparative basis"
],
"name": "Enhanced privacy and authentication for the global system for mobile communications",
"pagination": "231-243",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1037184662"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1023/a:1019103228471"
]
}
],
"sameAs": [
"https://doi.org/10.1023/a:1019103228471",
"https://app.dimensions.ai/details/publication/pub.1037184662"
],
"sdDataset": "articles",
"sdDatePublished": "2022-05-10T09:48",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/article/article_320.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1023/a:1019103228471"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1023/a:1019103228471'
This table displays all metadata directly associated to this object as RDF triples.
143 TRIPLES
22 PREDICATES
82 URIs
70 LITERALS
6 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1023/a:1019103228471 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | ″ | anzsrc-for:10 |
4 | ″ | ″ | anzsrc-for:1005 |
5 | ″ | schema:author | N74a9947f2e0c48939a8326933b75431a |
6 | ″ | schema:citation | sg:pub.10.1007/978-0-387-34980-0_28 |
7 | ″ | ″ | sg:pub.10.1007/978-0-387-34980-0_33 |
8 | ″ | schema:datePublished | 1999-07 |
9 | ″ | schema:datePublishedReg | 1999-07-01 |
10 | ″ | schema:description | The Global System for Mobile Communications (GSM) is widely recognized as the modern digital mobile network architecture. Increasing market demands point toward the relevancy of security‐related issues in communications. The security requirements of mobile communications for the mobile users include: (1) the authentication of the mobile user and Visitor Location Register/Home Location Register; (2) the data confidentiality between mobile station and Visitor Location Register, and the data confidentiality between Visitor Location Register and Visitor Location Register/Home Location Register (VLR/HLR); (3) the location privacy of mobile user. However, GSM does not provide enough security functions to meet these requirements. We propose three improved methods to enhance the security, to reduce the storage space, to eliminate the sensitive information stored in VLR, and consequently to improve the performance of the system. Proposed methods include an improved authentication protocol for the mobile station, a data confidentiality protocol, and a location privacy protocol. The merit of the proposed methods is to improve but not to alter the existing architecture of the system. Furthermore, this study also performs computational and capacity analyses to evaluate the original GSM system and proposed approaches on a comparative basis. |
11 | ″ | schema:genre | article |
12 | ″ | schema:inLanguage | en |
13 | ″ | schema:isAccessibleForFree | false |
14 | ″ | schema:isPartOf | Neaaf9afb6a8740d193cbc581447337de |
15 | ″ | ″ | Nf261af38678f4a5ca3289279699c76ff |
16 | ″ | ″ | sg:journal.1327893 |
17 | ″ | schema:keywords | GSM |
18 | ″ | ″ | GSM system |
19 | ″ | ″ | Register |
20 | ″ | ″ | VLR |
21 | ″ | ″ | analysis |
22 | ″ | ″ | approach |
23 | ″ | ″ | architecture |
24 | ″ | ″ | authentication |
25 | ″ | ″ | authentication protocol |
26 | ″ | ″ | basis |
27 | ″ | ″ | capacity analysis |
28 | ″ | ″ | communication |
29 | ″ | ″ | comparative basis |
30 | ″ | ″ | confidentiality |
31 | ″ | ″ | confidentiality protocols |
32 | ″ | ″ | data confidentiality |
33 | ″ | ″ | demand |
34 | ″ | ″ | enhanced privacy |
35 | ″ | ″ | function |
36 | ″ | ″ | global system |
37 | ″ | ″ | home location register |
38 | ″ | ″ | improved authentication protocol |
39 | ″ | ″ | information |
40 | ″ | ″ | issues |
41 | ″ | ″ | location privacy |
42 | ″ | ″ | location register |
43 | ″ | ″ | market demand |
44 | ″ | ″ | merits |
45 | ″ | ″ | method |
46 | ″ | ″ | mobile communications |
47 | ″ | ″ | mobile network architecture |
48 | ″ | ″ | mobile station |
49 | ″ | ″ | mobile users |
50 | ″ | ″ | network architecture |
51 | ″ | ″ | performance |
52 | ″ | ″ | privacy |
53 | ″ | ″ | privacy protocols |
54 | ″ | ″ | protocol |
55 | ″ | ″ | relevancy |
56 | ″ | ″ | requirements |
57 | ″ | ″ | security |
58 | ″ | ″ | security functions |
59 | ″ | ″ | security requirements |
60 | ″ | ″ | security-related issues |
61 | ″ | ″ | sensitive information |
62 | ″ | ″ | space |
63 | ″ | ″ | stations |
64 | ″ | ″ | storage space |
65 | ″ | ″ | study |
66 | ″ | ″ | system |
67 | ″ | ″ | users |
68 | ″ | ″ | visitor location register |
69 | ″ | schema:name | Enhanced privacy and authentication for the global system for mobile communications |
70 | ″ | schema:pagination | 231-243 |
71 | ″ | schema:productId | N614d003f1ab343ebae44d9b05e526565 |
72 | ″ | ″ | Nff665027d90640fc976abca2a30ee618 |
73 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1037184662 |
74 | ″ | ″ | https://doi.org/10.1023/a:1019103228471 |
75 | ″ | schema:sdDatePublished | 2022-05-10T09:48 |
76 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
77 | ″ | schema:sdPublisher | N87293c2e28b542659a25fc5a48962d8b |
78 | ″ | schema:url | https://doi.org/10.1023/a:1019103228471 |
79 | ″ | sgo:license | sg:explorer/license/ |
80 | ″ | sgo:sdDataset | articles |
81 | ″ | rdf:type | schema:ScholarlyArticle |
82 | N614d003f1ab343ebae44d9b05e526565 | schema:name | doi |
83 | ″ | schema:value | 10.1023/a:1019103228471 |
84 | ″ | rdf:type | schema:PropertyValue |
85 | N74a9947f2e0c48939a8326933b75431a | rdf:first | sg:person.07707133375.83 |
86 | ″ | rdf:rest | N9490354939fd40e5be604d8a62f2cbc7 |
87 | N87293c2e28b542659a25fc5a48962d8b | schema:name | Springer Nature - SN SciGraph project |
88 | ″ | rdf:type | schema:Organization |
89 | N9490354939fd40e5be604d8a62f2cbc7 | rdf:first | sg:person.016323640407.22 |
90 | ″ | rdf:rest | Ndcd18408454a482f8052be78fb7976ec |
91 | Ndcd18408454a482f8052be78fb7976ec | rdf:first | sg:person.014374171260.51 |
92 | ″ | rdf:rest | rdf:nil |
93 | Neaaf9afb6a8740d193cbc581447337de | schema:volumeNumber | 5 |
94 | ″ | rdf:type | schema:PublicationVolume |
95 | Nf261af38678f4a5ca3289279699c76ff | schema:issueNumber | 4 |
96 | ″ | rdf:type | schema:PublicationIssue |
97 | Nff665027d90640fc976abca2a30ee618 | schema:name | dimensions_id |
98 | ″ | schema:value | pub.1037184662 |
99 | ″ | rdf:type | schema:PropertyValue |
100 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
101 | ″ | schema:name | Information and Computing Sciences |
102 | ″ | rdf:type | schema:DefinedTerm |
103 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
104 | ″ | schema:name | Data Format |
105 | ″ | rdf:type | schema:DefinedTerm |
106 | anzsrc-for:10 | schema:inDefinedTermSet | anzsrc-for: |
107 | ″ | schema:name | Technology |
108 | ″ | rdf:type | schema:DefinedTerm |
109 | anzsrc-for:1005 | schema:inDefinedTermSet | anzsrc-for: |
110 | ″ | schema:name | Communications Technologies |
111 | ″ | rdf:type | schema:DefinedTerm |
112 | sg:journal.1327893 | schema:issn | 1022-0038 |
113 | ″ | ″ | 1572-8196 |
114 | ″ | schema:name | Wireless Networks |
115 | ″ | schema:publisher | Springer Nature |
116 | ″ | rdf:type | schema:Periodical |
117 | sg:person.014374171260.51 | schema:affiliation | grid-institutes:grid.260539.b |
118 | ″ | schema:familyName | Yang |
119 | ″ | schema:givenName | Wei‐Pang |
120 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014374171260.51 |
121 | ″ | rdf:type | schema:Person |
122 | sg:person.016323640407.22 | schema:affiliation | grid-institutes:None |
123 | ″ | schema:familyName | Hwang |
124 | ″ | schema:givenName | Min‐Shiang |
125 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016323640407.22 |
126 | ″ | rdf:type | schema:Person |
127 | sg:person.07707133375.83 | schema:affiliation | grid-institutes:grid.260539.b |
128 | ″ | schema:familyName | Lee |
129 | ″ | schema:givenName | Chii‐Hwa |
130 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07707133375.83 |
131 | ″ | rdf:type | schema:Person |
132 | sg:pub.10.1007/978-0-387-34980-0_28 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1036007087 |
133 | ″ | ″ | https://doi.org/10.1007/978-0-387-34980-0_28 |
134 | ″ | rdf:type | schema:CreativeWork |
135 | sg:pub.10.1007/978-0-387-34980-0_33 | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1036743552 |
136 | ″ | ″ | https://doi.org/10.1007/978-0-387-34980-0_33 |
137 | ″ | rdf:type | schema:CreativeWork |
138 | grid-institutes:None | schema:alternateName | Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC |
139 | ″ | schema:name | Department of Information Management, Chao Yang University of Technology, WuFeng, Taichung, Taiwan, ROC |
140 | ″ | rdf:type | schema:Organization |
141 | grid-institutes:grid.260539.b | schema:alternateName | Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan |
142 | ″ | schema:name | Department of Computer and Information Science, National Chiao Tung University, 30050, ROC, Hsinchu, Taiwan |
143 | ″ | rdf:type | schema:Organization |