A Study Report on Authentication Protocols in GSM, GPRS and UMTS

Wireless and mobile communications are having great features and is attractive among users as well as service providers. Unlike wired, wireless networks provide anytime, anywhere access to the users. Masquerading and eavesdropping are major threats in mobile Communications. To provide protection in communication, the authors require enciphering of voice message and authentication for subscriber with the communication network. This paper presents a complete study report on authentication protocols and its application on mobile communication systems like GSM, GPRS and UMTS. In addition, they describe the encryption and authentication algorithms that are used in these architectures.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Engineering Research and Development (IJERD)
Topic:
Security
Format:
PDF