• Dec 29, 2018 News!Vol.10, No.6 has been published with online version.   [Click]
  • Aug 06, 2018 News!Vol.9, No.1-Vol.9, No.4 have been indexed by EI (Inspec).   [Click]
  • Oct 26, 2018 News!Vol.10, No.5 has been published with online version.   [Click]
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(3): 405-410 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.176

Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications

Pijush Kanti Bhattacharjee

Abstract—Hacking and threats are increasing day by day. Authentication of mobile subscribers and network is an important criterion to the researchers. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-G mobile communication uses two different switching techniques: circuit switching for voice and low speed data communications, and packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication uses packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3-G network), authentication is mutual where both MS and MSC or network authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, I propose a mutual authentication tracking loop technique that verifies the authenticity of the subscriber as well as the network by subscriber’s password, SIM and biometric property of the subscriber. Two biometric parameters are used in which one biometric parameter is stored in SIM. The other biometric parameter, taken as voice frequency for the common words spoken by a subscriber, called certified document (CD), is stored at the server (PDSN or MSC). An algorithm is developed by these four entities to check this authentication process at the starting time of a call as well as a regular time intervals (say 10~20 secs) while the call is progressing, named mutual authentication tracking loop technique for 3-G mobile communications.

Index Terms—Biometric property, Certified Document, Voice frequency, Clapping sound, Flipping sound, Mutual Authentication tracking, Packet Switching, Password, SIM.

Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He has possessed vast working experience in the field of Telecommunications including Mobile Communications, Image Processing, VLSI etc during last 29 years.
 He is a member of IACSIT, Singapore; CSTA, USA; IAEng, Hongkong.(phone: +91-33-25954148; email: pijushbhatta_6@hotmail.com)


Cite: Pijush Kanti Bhattacharjee, "Mutual Authentication Tracking Loop Technique for 3-G Mobile Communications," International Journal of Computer Theory and Engineering vol. 2, no. 3, pp. 405-410, 2010.  

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com