Skip to main content
Log in

A solution to the anonymity of the mobile subscriber

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The user anonymity mechanism provided in GSM and UMTS network is analyzed, and a new approach to solve the anonymity of mobile subscriber is proposed in this paper. Using the ciphering algorithm with a dynamic key and a static key, the method allows mobile subscribers to connect network with user anonymity, and it can be seamlessly integrated with the existing authentication algorithms. The analyses reveal that the proposed scheme can provide the integrity protection of messages, prevent the replay attacks, and be implemented easily.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Boman K, Horn G, Howard P, et al. UMTS security[J]. Electronics & Communication Engineering Journal, 2002, 8: 5–6.

    Google Scholar 

  2. Das M L, Saxena A, Gulati V P. A dynamic ID-based remote user authentication schmem[J]. IEEE Transactions on Consummer Electronics, 2004, 50(2): 629–631.

    Article  Google Scholar 

  3. Lee Sungwoon, Kwon Hyuckjin, Kim Hyunsung. Cryptanalysis on improved remote user authentication scheme preserving user anonymity[J]. International Journal of Computer Science and Network Security, 2008, 8(10): 21–24.

    Google Scholar 

  4. Bindu C S, Reddy P C S, Satyanarayana B. Improved remote user authentication scheme preserving user anonymity[J]. International Journal of Computer Science and Network Security, 2008, 8(3): 62–64.

    Google Scholar 

  5. Wang Renchiun, Sheng Wen, Lei Chinlaung. A robust authentication scheme with user anonymity for wireless environments[ J]. International Journal of Innovative Computing, information and Control, 2009, 5(4): 1060–1080.

    Google Scholar 

  6. Toorani M, Beheshti Shirazi A A. Solutions to the GSM security weaknesses[C]// Proceedings of the Second International Conference on Next Generation Mobile Applications, Services and Technologies. Washington D C: IEEE Computer Society, 2008: 576–581.

    Google Scholar 

  7. Kitsos P, Sklavos N, Koufopavlou O. UMTS security: system architecture and hardware implementation[J]. Wireless Communications and Mobile Computing, 2007, 7: 483–494.

    Article  Google Scholar 

  8. Shnkar R, Rajkumar T, Dananjayan P. Security enhancement with optimal QoS using EAP-AKA in hybrid coupled 3G-WLAN convergence network[J]. International Journal of Ubiquitous Computing, 2010, 1(3): 31–42.

    Google Scholar 

  9. 3GPP TS 33.102 V8.0.0. Third Generation Partnership Project (3GPP), 3G Security: Security Architecture (Release 8) [R/OL]. [2008-06-10]. http://www.3gpp.org/ftp/specs/html .

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuzhu Wang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (71101152)

Biography: WANG Yuzhu, male, Professor, research direction: cryptology and information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Y., Li, S. & Ju, Y. A solution to the anonymity of the mobile subscriber. Wuhan Univ. J. Nat. Sci. 17, 229–232 (2012). https://doi.org/10.1007/s11859-012-0833-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-012-0833-4

Key words

CLC number

Navigation