• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(1): 26-30 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.111

Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications

Pijush Kanti Bhattacharjee, Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik

Abstract—Authentication of mobile subscribers and network is a challenging issue to the researchers, since hacking and threats are increasing with the enhanced population of wireless traffic. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-Gmobile communication uses two different switching techniques: circuit switching for voice and low speed data communications, and packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication uses packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3-G network), authentication is mutual where both MS and network (MSC) authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, we propose a mutual authentication technique that verifies the authenticity of the subscriber as well as the network (MSC or PDSN) by subscriber’s password, SIM and biometric property of the subscriber. Two biometric parameters are used in which one biometric parameter is stored in SIM and the other biometric parameter taken as frequency of Flipping or Clapping sound of the subscriber, called certified document (CD), is stored at server (MSC or PDSN). An algorithm is developed by these four entities to check this authentication process, termed biometric entity based mutual authentication technique for 3-G mobile communications.

Index Terms—Biometric property, Certified Document, Clapping sound, Flipping sound, Mutual Authentication, Packet Switching, Password, SIM.

Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He is a member of IACSIT, IAENG and IE.
(phone: +91-33-25954148; email: pijushbhatta_6@hotmail.com).
Chandan Koner is an Assistant Professor in the Department of Computer Science and Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He is pursuing PhD course. He is a member of IACSIT and IAENG.
(phone: +91-9434535556; email: chandan_durgapur@yahoo.com).
Chandan Tilak Bhunia is a Director, Bengal Institute of Technology andManagement, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India.He is a Senior Member of IEEE, FIE (I) and FIETE.
(phone: +91-9434033157; email: ctbhunia@vsnl.com).
Ujjwal Maulik is currently a Professor in the Department of Computer Science and Technology, Jadavpur University, Kolkata, India. He is a Senior Member of IEEE and FIE(I).(phone: +91-33-24131766; email: ujjwal_maulik@yahoo.com)

[PDF]

Cite: Pijush Kanti Bhattacharjee, Chandan Koner, Chandan Tilak Bhunia and Ujjwal Maulik, "Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications," International Journal of Computer Theory and Engineering vol. 2, no. 1, pp. 26-30, 2010.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com