An Authentication Protocol for Mobile Cellular Network

Authors

  • L. A. Mohammed Department of Computer and Communications System Engineering, UPM, Serdang
  • Abdul Rahman Ramli Department of Computer and Communications System Engineering, UPM, Serdang
  • Mohamed Daud Department of Biological and Agricultural Engineering 43400, UPM Serdang
  • V. Prakash Department of Computer and Communications System Engineering, UPM, Serdang

Keywords:

Cellular telephone fraud, Key management, Authentication protocol

Abstract

Current cellular telephone system is vulnerable to various attacks. With more complicated equipments, it is possible to receive the ESN and PIN of legal user and use them to commit cellular telephone frauds. Generally, the frauds can be classified into three: subscription fraud, technical fraud, and internal fraud. This paper analyses the frauds in cellular mobile communication and provides an efficient authentication protocol that can be taken to protect the current system.

Downloads

Download data is not yet available.

Downloads

Published

2002-06-01

How to Cite

Mohammed, L. A., Ramli, A. R., Daud, M., & Prakash, V. (2002). An Authentication Protocol for Mobile Cellular Network. Malaysian Journal of Computer Science, 15(1), 37–44. Retrieved from https://ijps.um.edu.my/index.php/MJCS/article/view/6043