International Journal of Computer Science and Information Technology & Security (IJCSITS)
Authentication of mobile subscribers and network are a challenge of future researchers due to increasing security threats and attacks with the enhanced volume of wireless traffic. 4G mobile communications system has brought for the high speedy data communications network. In 2-G mobile communications is based on checking the authenticity of MS (Mobile Station or Subscriber) by challenge-response mechanism. Here authenticity is one-way for which MSC (Mobile or Main Switching Center) checks the validity of MS.