An Authentication Protocol for Mobile Cellular Network

Authors

  • L. A. Mohammed Department of Computer and Communications System Engineering, UPM, Serdang
  • Abdul Rahman Ramli Department of Computer and Communications System Engineering, UPM, Serdang
  • Mohamed Daud Department of Biological and Agricultural Engineering 43400, UPM Serdang
  • V. Prakash Department of Computer and Communications System Engineering, UPM, Serdang

Keywords:

Cellular telephone fraud, Key management, Authentication protocol

Abstract

Current cellular telephone system is vulnerable to various attacks. With more complicated equipments, it is possible to receive the ESN and PIN of legal user and use them to commit cellular telephone frauds. Generally, the frauds can be classified into three: subscription fraud, technical fraud, and internal fraud. This paper analyses the frauds in cellular mobile communication and provides an efficient authentication protocol that can be taken to protect the current system.

Downloads

Published

2002-06-01

How to Cite

An Authentication Protocol for Mobile Cellular Network. (2002). Malaysian Journal of Computer Science, 15(1), 37-44. https://tamilperaivu.um.edu.my/index.php/MJCS/article/view/6043

Similar Articles

1-10 of 132

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)