SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System

  • Mi-Og Park
  • Dea-Woo Park
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)


The Global System for Mobile Communications (GSM) is the most popular standard for mobile phones in the world. GSM phones are used by over the billion people across more than 200 countries. In spite of the tremendous market growth, however, there are major security drawbacks in the GSM system. In this paper, we introduce the secure user authentication scheme to solve the problem: user authentication and location privacy. Also the proposed scheme provides partial anonymity, because of the usage of temporary identity and the new mechanism that the only authenticated VLR can use the MS’s IMSI. Besides, we introduce the modified scheme to reduce user authentication procedure without changing of the architecture of the original GSM system.


User Authentication Authentication Protocol Mutual Authentication Location Privacy Bandwidth Consumption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Eberspacher, J., Vogel, H.-J., Bettstetter, C.: GSM, switching, Services and Protocols, 2nd edn. WILEY, Chichester (2001)CrossRefGoogle Scholar
  2. 2.
    Broron, D.: Techniques for privacy and authentication in personal communication systems. IEEE Personal communications, 6–10 (August 1995)Google Scholar
  3. 3.
    Willas, J.E.: Privacy and authentication needs of PCS. IEEE personal communications, 11–15 (August 1995)Google Scholar
  4. 4.
    Shieh, S.P., Lin, C.T., Hsueh, J.T.: Secure communication in Global Systems for Mobile Telecommunications. In: Proc. 1st Workshop on Mobile Computing, ROC, pp. 136–142 (1995)Google Scholar
  5. 5.
    Harn, L., Lin, H.Y.: Modification to enhance the security of the GSM protocol. In: Proceedings of the 5th National Conference on Information security, Taipei, Taiwan, May 1995, pp. 416–420 (1995)Google Scholar
  6. 6.
    Lee, C.C., Hwang, M.S., Yang, W.P.: Extension of authentication protocol for GSM. IEE Proceedings. Communications 150(2), 91–95 (2003)CrossRefGoogle Scholar
  7. 7.
    Al-Tawil, K., Akrami, A., Youssef, H.: A new authentication protocol for GSM networks. In: Proceedings of IEEE 23rd Annual Conference on Local Computer Networks (LCN 1998), pp. 21–30 (1998)Google Scholar
  8. 8.
    Stach, J.F., Park, E.K., Makki, K.: Performance of an enhanced GSM protocol supporting non-repudiayion of service. Comput. Commun., 675–680 (1999)Google Scholar
  9. 9.
    Molva, R., Samfat, D., Tsudik, G.: Authentication of mobile users. Network, IEEE 8(2), 26–34 (1994)CrossRefGoogle Scholar
  10. 10.
    Molva, R., Tsudik, G., Herreweghen, E.V., Zatti, S.: KryptoKnight: Authentication and key distribution system. In: Proceedings on 1992 European Symposium on Research in Computer Security, pp. 155–174 (1992)Google Scholar
  11. 11.
    Cho, Y., Cho, S., Choi, D., Jin, S., Chung, K.-I., Park, C.: A location privacy protection mechanism for smart space. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 162–173. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Lee, C.-H., Hwang, M.-S., Yang, W.-P.: Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5(4), 231–243 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mi-Og Park
    • 1
  • Dea-Woo Park
    • 2
  1. 1.Division of Computer EngineeringSungkyul UniversityAnyang-city, Gyeonggi-doKorea
  2. 2.Department of Computer ScienceSoongsil UniversitySeoulKorea

Personalised recommendations