Diminishing signalling traffic for authentication in mobile communication system
نویسندگان
چکیده
To identify a mobile station (MS) and validate legal service requests, authentication functions are utilized in the location registration, call origination and call termination procedures. In GSM, the VLR requests the HLR for assistance in authenticating the visiting user. The authentication center (AuC) in the home network generates 3-tuples and sends them back to the VLR for subsequent authentications during the user’s residence. If these 3-tuples are used up before the MS’s leaving, another request is issued by the VLR. The request is expensive, because it needs to access the HLR/AuC. Traditionally, a fixed-K strategy is used. That is, K 3-tuples are sent to the VLR for each request. Lager K is preferred to reduce the number of the expensive requests for 3-tuples. However, much waste of 3-tuples is observed, especially when an inactive user is considered. Hence, K value should be determined based on the usage pattern of the user. We propose a dynamic-K (DK) strategy to reduce the waste and diminish the signaling traffic for authentication. Simulation results show that the DK strategy can effectively determine the appropriate K value. Not only the waste but also the number of requests are diminished efficiently.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA New Authentication Protocol for UMTS Mobile Networks
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected respon...
متن کاملA Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment
— Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJEB
دوره 2 شماره
صفحات -
تاریخ انتشار 2004