Skip to main content
Log in

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recent years, the mobile technology has experienced a great increment in the number of its users. The GSM’s architecture provides different security features like authentication, data/signaling confidentiality and secrecy of user yet the channel is susceptible to replay and interleaved. It always remains relevant as it is important in all types of application. Global system for mobile (GSM) communications has become the most popular standard for digital cellular communication. The GSM security system depends on encryption, authentication algorithms and information from SIM card. In this research paper, we proposed the design and implementation of a new authentication scheme by using certificate-less public key cryptography (CL-PKC) over the GSM system was attempted to miss some system detail. This research paper, we also proposed the GSM system and its security and public key cryptography with a focus in the CL-PKC; the CL-PKC is a simple, useful and robust security scheme designed and implemented over GSM. Our approach is more efficient than other competing topologies. We solved the GSM problem in A3 algorithm such as eavesdropping and this problem solved by CL-PKC because of its robustness against this type of attack by providing mutual authentication make the system more secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Bridle, J. S. (1990). Probabilistic interpretation of feedforward classification network outputs, with relationships to statistical pattern recognition. In Neurocomputing (pp. 227–236). Berlin: Springer.

  2. Tarjan, R. E., & Yannakakis, M. (1984). Simple linear-time algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM Journal on Computing, 13(3), 566–579.

    Article  MathSciNet  MATH  Google Scholar 

  3. Goswami, S., Laha, S., Chakraborty, S., & Dhar, A. (2012). Enhancement of GSM Security using elliptic curve cryptography algorithm. In Intelligent systems, modelling and simulation (ISMS), 2012 third international conference on (pp. 639–644). IEEE.

  4. Driessen, B., Hund, R., Willems, C., Paar, C., & Holz, T. (2013). An experimental security analysis of two satphone standards. ACM Transactions on Information and System Security (TISSEC), 16(3), 10.

    Article  Google Scholar 

  5. Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In Computer and information technology (CIT), 2010 IEEE 10th international conference on (pp. 1079–1084). IEEE.

  6. Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM.

  7. Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM.

  8. Yin, X., & Han, J. (2003). CPAR: Classification based on predictive association rules, Proceedings 2003 SIAM International Conference on Data Mining (SDM’03), San Francisco CA, pp. 331–335.

  9. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM.

  10. Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM.

  11. Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM.

  12. Teng, J., & Wu, C. (2012). A provable authenticated certificateless group key agreement with constant rounds. Journal of Communications and Networks, 14(1), 104–110.

    Article  Google Scholar 

  13. Hableel, E., Byon, Y.-J., & Beak, J. (2013). Public key infrastructure for UAE: A case study. In Proceedings of the 6th international conference on security of information and networks (pp. 336–340). ACM.

  14. Ray, S., & Biswas, G. (2012). An ECC based public key infrastructure usable for mobile applications. In Proceedings of the second international conference on computational science, engineering and information technology (pp. 562–568). ACM.

  15. Praveen, I., & Sethumadhavan, M. (2012). A more efficient and faster pairing computation with cryptographic security. In Proceedings of the first international conference on security of internet of things (pp. 145–149). ACM.

  16. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM.

  17. Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.

    Article  MathSciNet  Google Scholar 

  18. Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473, Springer).

  19. Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM.

  20. Li, J., Huang, X., Mu, Y., Susilo, W., & Wu, Q. (2007). Certificate-based signature: Security model and efficient construction. In Public key infrastructure (pp. 110–125). Springer.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imran Memon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Memon, I., Mohammed, M.R., Akhtar, R. et al. Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC). Wireless Pers Commun 79, 661–686 (2014). https://doi.org/10.1007/s11277-014-1879-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1879-8

Keywords

Navigation