• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2011 Vol.3(6): 732-737 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.401

Mutual Authentication Technique Applying Three Entitiesin 4-G Mobile Communications

Pijush Kanti Bhattacharjee, and Rajat Kumar Pal

Abstract—Fourth Generation (4-G) mobile communications system has an evolution of high speedy data communications with connectivity all sorts of the networks, like 2-G and 3-G mobile networks, Internet, PSTN (Public Switched Telephone Network), PDN (Public Data Network), ISDN (Integrated Services Digital Network), WLAN (Wireless Local Area Network), WPAN (Wireless Personal Area Network), WCAN (Wireless Corporate Area Network), WHAN (Wireless Home Area Network), Wi-Fi, WiMAX (Worldwide Interoperability for Microwave Access), MANET (Mobile Ad Hoc Network), VANET (Vehicular Ad Hoc Network), etc. In 4-G Mobile communications ubiquitous access to applications over the most efficient combination of wireless systems in heterogeneous manner is available. Authentication of mobile subscriber and network is an important criterion due to increasing security threats and attacks in mobile communications. In circuit switching (3-G network), authentication is mutual where both MS and MSC or network authenticate each other, despite in packet switching - only network (servers in PDSN) verifies the authenticity of MS. In this paper, we propose a mutual authentication technique for circuit and packet switching both that examines the authenticity of the subscriber as well as the network by subscriber’s password, SIM (expressed as identifier) and biometric property of the subscriber, called as mutual authentication technique using three entities in 4-G mobile communications.

Index Terms—Authenticity of mobile station or subscriber, biometric scheme, challenge/Response mechanism, circuit switching, Packet switching, PDSN, AAA, SGSN, GGSN, identifier, password.

Authors are with Department in Assam University (A Central University), Silchar, Pin 788011, Assam, India. (phone: +91-33-25954148, email-pijushbhatta_6@hotmail.com; phone: +91-33-25954148, email-rajat.kp@gmail.com).

[PDF]

Cite: Pijush Kanti Bhattacharjee and Rajat Kumar Pal, "Mutual Authentication Technique Applying Three Entitiesin 4-G Mobile Communications," International Journal of Computer Theory and Engineering vol. 3, no. 6, pp. 732-737, 2011.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com