Abstract
The user anonymity mechanism provided in GSM and UMTS network is analyzed, and a new approach to solve the anonymity of mobile subscriber is proposed in this paper. Using the ciphering algorithm with a dynamic key and a static key, the method allows mobile subscribers to connect network with user anonymity, and it can be seamlessly integrated with the existing authentication algorithms. The analyses reveal that the proposed scheme can provide the integrity protection of messages, prevent the replay attacks, and be implemented easily.
Similar content being viewed by others
References
Boman K, Horn G, Howard P, et al. UMTS security[J]. Electronics & Communication Engineering Journal, 2002, 8: 5–6.
Das M L, Saxena A, Gulati V P. A dynamic ID-based remote user authentication schmem[J]. IEEE Transactions on Consummer Electronics, 2004, 50(2): 629–631.
Lee Sungwoon, Kwon Hyuckjin, Kim Hyunsung. Cryptanalysis on improved remote user authentication scheme preserving user anonymity[J]. International Journal of Computer Science and Network Security, 2008, 8(10): 21–24.
Bindu C S, Reddy P C S, Satyanarayana B. Improved remote user authentication scheme preserving user anonymity[J]. International Journal of Computer Science and Network Security, 2008, 8(3): 62–64.
Wang Renchiun, Sheng Wen, Lei Chinlaung. A robust authentication scheme with user anonymity for wireless environments[ J]. International Journal of Innovative Computing, information and Control, 2009, 5(4): 1060–1080.
Toorani M, Beheshti Shirazi A A. Solutions to the GSM security weaknesses[C]// Proceedings of the Second International Conference on Next Generation Mobile Applications, Services and Technologies. Washington D C: IEEE Computer Society, 2008: 576–581.
Kitsos P, Sklavos N, Koufopavlou O. UMTS security: system architecture and hardware implementation[J]. Wireless Communications and Mobile Computing, 2007, 7: 483–494.
Shnkar R, Rajkumar T, Dananjayan P. Security enhancement with optimal QoS using EAP-AKA in hybrid coupled 3G-WLAN convergence network[J]. International Journal of Ubiquitous Computing, 2010, 1(3): 31–42.
3GPP TS 33.102 V8.0.0. Third Generation Partnership Project (3GPP), 3G Security: Security Architecture (Release 8) [R/OL]. [2008-06-10]. http://www.3gpp.org/ftp/specs/html .
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (71101152)
Biography: WANG Yuzhu, male, Professor, research direction: cryptology and information security.
Rights and permissions
About this article
Cite this article
Wang, Y., Li, S. & Ju, Y. A solution to the anonymity of the mobile subscriber. Wuhan Univ. J. Nat. Sci. 17, 229–232 (2012). https://doi.org/10.1007/s11859-012-0833-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-012-0833-4