• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(3): 405-410 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.176

Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications

Pijush Kanti Bhattacharjee

Abstract—Hacking and threats are increasing day by day. Authentication of mobile subscribers and network is an important criterion to the researchers. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-G mobile communication uses two different switching techniques: circuit switching for voice and low speed data communications, and packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication uses packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3-G network), authentication is mutual where both MS and MSC or network authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, I propose a mutual authentication tracking loop technique that verifies the authenticity of the subscriber as well as the network by subscriber’s password, SIM and biometric property of the subscriber. Two biometric parameters are used in which one biometric parameter is stored in SIM. The other biometric parameter, taken as voice frequency for the common words spoken by a subscriber, called certified document (CD), is stored at the server (PDSN or MSC). An algorithm is developed by these four entities to check this authentication process at the starting time of a call as well as a regular time intervals (say 10~20 secs) while the call is progressing, named mutual authentication tracking loop technique for 3-G mobile communications.

Index Terms—Biometric property, Certified Document, Voice frequency, Clapping sound, Flipping sound, Mutual Authentication tracking, Packet Switching, Password, SIM.

Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He has possessed vast working experience in the field of Telecommunications including Mobile Communications, Image Processing, VLSI etc during last 29 years.
 He is a member of IACSIT, Singapore; CSTA, USA; IAEng, Hongkong.(phone: +91-33-25954148; email: pijushbhatta_6@hotmail.com)

[PDF]

Cite: Pijush Kanti Bhattacharjee, "Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications," International Journal of Computer Theory and Engineering vol. 2, no. 3, pp. 405-410, 2010.  

 
 
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com