Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Online First Paper

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Full Text:

Abstract
Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network

Article Statistics
Statistical data for 'online first' paper are not collected.

Cite this article
IEEE Style
Ghazli Abdelkader, Hadj Said Naima, and Ali Pacha Adda, "Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication ," Journal of Information Processing Systems. DOI: .

ACM Style
Ghazli Abdelkader, Hadj Said Naima, and Ali Pacha Adda, "Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication ," Journal of Information Processing Systems, DOI: .