ArticlePDF Available

A Novel Approach for Authentication Technique in Mobile Communications

Authors:

Abstract

Authentication of mobile subscriber is a challenge of future researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3G mobile communication system has been developed to speed up the data communication. In general the authentication technique in 2G mobile communication is solely dependent on checking the authenticity of MS (Mobile Station or Subscriber) by challenge/response mechanism. Here authenticity is one-way for which MSC (Mobile or Main Switching Center) checks the validity of MS. 3G mobile communication works on two different switching techniques. One is circuit switching for voice and low speed data communications. The other one is packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication is established by packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3G network) authentication is mutual where both MS and MSC or network authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, we enlighten different new approaches that can be effectively used as an authentication tool in 3G mobile communications.
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August 2009
1793-8201
- 216 -
AbstractAuthentication of mobile subscriber is a challenge
of future researchers due to increasing security threats and
attacks with the enhanced population of wireless traffic. 3G
mobile communication system has been developed to speed up
the data communication. In general the authentication
technique in 2G mobile communication is solely dependent on
checking the authenticity of MS (Mobile Station or Subscriber)
by challenge/response mechanism. Here authenticity is one-way
for which MSC (Mobile or Main Switching Center) checks the
validity of MS. 3G mobile communication works on two
different switching techniques. One is circuit switching for voice
and low speed data communications. The other one is packet
switching mainly for data communication, but can afford voice
communication like VoIP (Voice Over Internet Protocol), video
telephony, multimedia service etc. Generally high speed data
communication is established by packet switching process
through PDSN (Packet Data Serving Node) servers. In circuit
switching (3G network) authentication is mutual where both
MS and MSC or network authenticate each other, but in packet
switching only network (servers in PDSN) examines the
authenticity of MS. In this paper, we enlighten different new
approaches that can be effectively used as an authentication tool
in 3G mobile communications.
Index TermsAuthenticity of Mobile Station or Subscriber,
Challenge/Response Mechanism, Circuit Switching, Identifier,
Packet Switching, PDSN, Password.
I. INTRODUCTION
The influence of the Internet and IP technology has
extended to enlighten the cellular area in high speed data
transmission [1][5]. Data rates reach upto 2 Mbps or more
for 3-G mobile communications, opening opportunities for
Chandan Koner is an Assistant Professor in the Department of Computer
Science and Engineering, Bengal Institute of Technology and Management,
Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He is pursuing
PhD course. He is member of IACSIT and IAENG (phone:
+91-9434535556).
Pijush Kanti Bhattacharjee is an Assistant Professor in the Department
of Electronics and Communication Engineering, Bengal Institute of
Technology and Management, Santiniketan, P.O. Doranda, West Bengal,
Pin-731236, India. He was an Ex Asssitant Director in the Department of
Telecommunications (DoT), Government of India, India. He has possessed
vast working experience in the field of Telecommunications including
Mobile Communications, Image Processing, VLSI etc during last 29 years.
(phone: +91-33-25954148, +91-9432166768; fax: +91-3463-271354; ).
Chandan Tilak Bhunia is a Director, Bengal Institute of Technology
and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236,
India. He is a Senior Member of IEEE, FIE (I) and FIETE.(phone:
+91-9434033157).
Ujjwal Maulik is currently a Professor in the Department of Computer
Science and Technology, Jadavpur University, Kolkata, India. He is a Senior
Member of IEEE and FIE(I). (phone: +91-33-24131766).
extensive wireless multimedia services. Enabling packet data
services off the RAN (Radio Access Network) in UMTS
(Universal Mobile Telecommunication System in USA) and
by passing the MSC is the beginning step for separating the
circuit based world of the PSTN and the packet based world
of PDNs (Public Data Networks) and the Internet [6]-[9]. The
European counterpart of UMTS is WCDMA (Wideband
Code Division Multiple Access), generally marketed as
3GSM. The WCDMA scheme has been developed as a joint
effort between ETSI and ARIB (Japanese) during the second
half of 1997, whereas, in March 1998, the TIA
(Telecommunications Industry Association) TR45.5
committee, adopted an innovation for wideband CDMA,
compatible with IS -95, which is called CDMA-2000. This
3-G network can provide circuit switched voice service,
circuit switched data service like 2-G (CDMA One or GSM),
in addition to this, packet switched data service [1]. The
packet switched can be enhanced in different speeds such as
38.4 kbps, 76.8 kbps, 153.6 kbps, 307.2 kbps, 614.4 kbps,
921.6 kbps, 1228.8 kbps, 1843.2 kbps, 2457.6 kbps etc. There
are different control channels e.g. MAC channel, Reverse
Traffic Channel, Access Channel etc which are associated to
and fro MS to MSC or PDSN to set up the communication
path implemented by proper authentication scheme.
II. ARCHITECTURE OF 3-G MOBILE SYSTEM
Architecture of a 3rd Generation wireless network
CDMA-2000 or WCDMA is described below in Fig. 1. This
3-G network can provide circuit switched voice service,
circuit switched data service like 2-G (CDMA One or GSM)
[3], [5], in addition to this packet switched data and
multimedia service [6]-[9]. In 2000 A.D, TIA
(Telecommunication Industry Association) publishes IS-856
(Interim Standard-856) network. It is known CDMA 2000 1X
EV-DO (Evolution Data Optimized). CDMA-2000 1X is
having chip rate 1.2288 Mcps, While WCDMA chip rate is
3.84 Mcps, but CDMA-2000 3X chip rate is 3.6864 Mcps.
MS - Mobile Station or Mobile Subscriber for transmitting
and receiving signals in air interface. It consists of USIM
(Universal Subscriber Identity Module) or SIM which
contains user identity i.e. subscribers number, data bases,
call charging etc.
MS to BTS path - Reverse or Up link,
BTS to MS path - Forward or Down link.
BTS Base Transceiver Station serves mobile connection
to one or more cells and sectors in the cellular network,
A Novel Approach for Authentication Technique
in Mobile Communications
C. Koner, Member, IACSIT, P. K. Bhattacharjee, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and
U Maulik Sr. Member, IEEE
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August 2009
1793-8201
217
Fig.1. A typical 3G wireless network architecture with high speed data network
contains TRXs i.e. transceivers or radio units.
BSS Base Station Sub Sys-BSCs & BTSs.
Submit your manuscript electronically for review.
BSC Base Switching Center controls one or more BTSs
and perform inter BTS and intra BTS switching and
handovers.
MSC Mobile Switching Center or Main Switching
Center which is a basic digital electronics exchange e.g.
5ESS means 5th version of Electronics Switching System.
MSC controls all the functions of a mobile network via
different registers or servers, specially for voice and low
speed data communications.
HLR Home Location Register occupies identities of
mobile subscriber as IMSI [International Mobile Subs
Identity], service parameters, location information etc.
VLR Visitor Location Register contains permanent and
temporary (roaming) mobile subscribers identity as TMSI,
ISDN directory number, routing etc.
EIR Equipment Identity Register contains identity of
mobile equipment called IMEI [International Mobile
Equipment Identity], connected with MSC or PDSN. It may
be valid, suspect or prohibited.
AUC Authentication Center contains authentication
data called Ki in 2-G and in 3-G several keys or encryption
codes
with algorithm for encrypting user speech and data due to
security purpose.
Billing Center It provides all sorts of charging or
commercial information. One billing center can handle the
calls from several MSCs. In case of data transfer, this billing
function is done by AAA server associated with PDSN in
data communication network.
In data network, MS is called AT (Access Terminal)
where data or messages in written form is originated or
terminated, where as BTS with BSC are called AN (Access
Network) which handles data and further transports to
PDSN through IS-2001 (Interim Standard-2001) network
specified by ITU [2], [6], [7]. Thus AN acts as an interface
between AT and PDSN. AT and AN are connected by
IS-856 network.
For increasing data rate in 2-G, the first step begins
with deploying GPRS or the PSDN (Public Switched Data
Network) for enabling packet data services in GSM and
CDMA-One networks. The VoIP (Voice-over-IP) gateway
function could be provided as an extended feature to the
circuit gateway or the PDSN for 3-G mobile
communications. The VoIP gateway will hold the vocoding
algorithms converting between a voice call encapsulated in
an air
Internet
ISP
BTS
PSTN
MSC
VLR
IS-41
IS-41
VLR
MSC
AUC
HLR
IS-2001
BTS
BTS
BTS
BSC
BSC
BTS
BTS
MS
MS
BSC
BTS
BTS
IP
AAA
FA PDSN
HA
IWF
MS
VLR
MSC
AN
AT
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August, 2009
1793-8201
- 218 -
interface frame and an IP end point that may be an
IP-enabled phone, IP based PBX or PC etc [7]-[9].
The circuit switched voice and data services are
arranged in same pattern as CDMA-One (2-G) by MS, BTS,
BSC, MSC, HLR, VLR, AUC and IWF. An IWF
(Inter-Working Function) is configured for converting a
signal into a form compatible with a destination network
receiving the data. While IWF enables circuit switched data
service and BSC carries out mobility management i.e.
controlling hand over or hand off. Additional networks are
provided in 3-G for providing packet switched data service
usually higher speed than that of circuit switched data
service in 2-G.
This packet switched data network [1]-[2], [6]-[9] is
consisting of two parts.
(1) Packet Data Serving Node (PDSN): The PDSN is the
element that provides packet switched data service, like
MSC for circuit switching. It is an internet protocol (IP)
router that switches user data traffic to a public data network
i.e. the internet. It deals with packet switched traffic
(generally data) between the MS i.e. the user and packet
switched network namely Internet or Intranet etc.
(2) Authentication, Authorization and Accounting (AAA):
The AAA is a server that provides three main functions like
authentication, authorization and accounting services for the
packet data traffic connected with PDSN. It ultimately
ensures packet data network connectivity services to the
mobile users.
Authentication requires the user to provide an account
number and password i.e. exchange of logical keys or
certificates between the client and the server. If this
authentication is correct, the MS is permitted for packet data
service by Authorization. Last but not the least, function of
AAA is accounting. It collects information on its usage of
packet data service for billing or tariff calculation.
The CDMA-2000 network is supporting simple IP and
mobile IP functions.
(i) Simple IP: An MS residing in home PDSN is given an
IP address M and the server on the internet has an IP address
S. Using these two addresses, IP packets containing data or
information are exchanged between the MS and different
servers in the same PDSN. A PDSN is consisting of several
servers for routing packets in different directions. These
servers are identified by the assigned address.
(ii) Mobile IP: Two additional network elements are
provided for supporting Mobile IP.
(a) Home Agent (HA): This is a router together with the
foreign agent (FA). This router resides on the MS home IP
network. It serves as a point for communications with the
mobile network.
(b) Foreign Agent (FA): This is another router residing in
other PDSN. When MS travels a foreign IP network, the FA
in the foreign network receives packet forwarded from the
HA and delivers them to the MS. Thus it functions as the
mobile nodes point of attachment when it travels to the
foreign network i.e. the network other than its home
network.
Thus mobile IP uses a tunneling protocol to allow
messages from the PDSN to be directed to the mobile nodes
IP address. This is accomplished by way of routing
messages to the foreign node for delivery via tunneling the
original IP address inside a packet destined for the temporary
IP address assigned to the mobile node by the foreign node.
This method allows for seamless communications between the
mobile node and applications residing on the PDSN,
always-on connectivity for mobile data applications and
wireless computing.
Third Generation mobile service is assured mainly by
two systems like WCDMA and CDMA-2000 [6]-[9]. Some of
the common feature between these two systems i.e.
CDMA-2000 1X and WCDMA are the followings:
Direct sequence spread spectrum multiple access
(CDMA-2000 1X uses 1.25 MHz bandwidth, WCDMA uses 5
MHz bandwidth), Orthogonal (Walsh) code division multiple
access (mitigates interference), Random access, Fast uplink
power control, Rake receivers, Soft handoff (between BTSs),
Softer handoff (between BTS sectors), Soft hand off (SHO)
active set (seamless service with increased spectral
efficiency), Single frequency reuse, QPSK (Quadrature
Phase Shift Keying) modulation, Downlink slotted paging,
Blind rate detection, Down link reference channel (share
common pilot), Downlink channel structure (separating
channels with Walsh codes), Scrambling (for uniform
interference and communication privacy), Speech regulated
vocoder (increased system capacity) etc. In case of packet
switching, variable length orthogonal codes are a mandatory
feature for both CDMA-2000 and WCDMA for managing the
mix of voice and non voice (data, multimedia)
communications. Packet switching can afford different
services like data, VoIP, Push to Talk, Video Telephony,
Multimedia communications etc. These include enhanced
downlink and uplink packet access techniques. High speed
packet data communications is done in identical features like
CDMA 2000 1X EV-DO (Evolution-Data Optimized) and
WCDMA HSUPA (High Speed Uplink Packet Access),
HSDPA (High Speed Downlink Packet Access).
At the same time there is existing some difference also
between these two systems such as, (i) Both WCDMA and
CDMA-2000 use separate coding scheme.
(ii) Both use control channels to manage the network.
(iii) WCDMA and CDMA-2000 are not compatible from
the perspective that they have different chip rates like 3.84
Mcps for WCDMA vs. 1.2888 Mcps for CDMA-2000.
WCDMA uses a 5 MHz channel (bandwidth) initially,
CDMA-2000 1X uses only a 1.25 MHz channel, but
CDMA-2000 3X, three 1.25 MHz channels combine to form 5
MHz bandwidth.
There are three modes of operation for WCDMA or
CDMA-2000
Direct sequence (DS) WCDMA in UMTS for
frequency Division Duplex (FDD).
W-CDMA Time Division Duplex (TDD).
CDMA 2000 Multicarrier FDD
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August, 2009
1793-8201
- 219 -
III. AUTHENTICATION IN MOBILE COMMUNICATIONS 2-G NETWORK
GSM (2-G) networks utilize authentication for verifying
authenticity of subscriber [3]-[5]. Each subscriber is
identified with a unique IMSI (International Mobile
Subscriber Identity) number. He has a unique subscriber
authentication key (Ki).The authentication algorithm used in
the GSM system in 2-G is known as the A3 algorithm. The
SIM (Subscribe Identity Module) contains the IMSI, Ki and
A3 algorithm. The AUC (Authentication Center) contains
the A3 algorithm as well as a database of authentication
information about the subscriber. A3 actually generates 128
bits of output. The first 32 bits of those 128 bits form the
Signed Response. The A3 algorithm is implemented in the
SIM (Subscriber Identity Module).
Authentication in the GSM network utilizes following
Challenge/Response mechanism,
1. The HLR (Home Location Register) generates a
128-bit RAND (Random Challenge).
2. The HLR sends RAND to the MSC (Mobile Switching
Center).
3. The MSC sends it to the BTS (Base Transceiver
Station).
4. The BTS sends it to the MS (Mobile Station).
5. The MS receives it and generates 32-bit SRES*
(Signed Response) utilizing RAND and the 128-bit Ki from
the SIM (Mobile Station's Subscriber Identity Module)
utilizing the A3 algorithm.
6. The MS sends the SRES* to the BTS.
7. The BTS sends the SRES* to the MSC.
8. The MSC checks whether SRES = SRES* or not. If
they are same, MS is authentic.
This process authenticates the MS (Mobile Station) to the
GSM or CDMA-One network. One known security
limitation of 2-G networks is that the network is never
authenticated by the MS (Mobile Station). This one-way
authentication makes it possible for an attacker to pretend to
be a network provider. As 2-G mobile authentication
mechanism is only one way, therefore the user is not given
the assurance that they have established a connection with
an authentic serving network.
IV. AUTHENTICATION FOR MOBILE
COMMUNICATIONS 3-G NETWORK
In 3-G mobile communication, voice communication is
held by MSC and its accessories. In packet switching,
authentication is done separately by PDSN servers [6]-[9].
In circuit switching, the authentication for establishing
voice path is done by the following procedure,
1. Mutual authentication where MS and MSC are
confirmed identity individually.
2. Assure that the authentication information and keys are
not being re-used (key freshness).
Additional parameters and cryptographic checks are
introduced in 3-G network to provide mutual entity
authentication between the USIM at the user side and the
AUC at the network side. This technique uses symmetric
key or code using a secret subscriber authentication key K
which is shared between and available only to the USIM and
the AUC in the users HE (Home Environment). In addition,
the AUC entrusts with track of a counter SQNHE and at the
same time USIM controls track of a counter SQNMS. It also
stores additional data to support network authentication
providing the user with assurance by key freshness.
This scheme is assembled of a challenge/response protocol
identical to the 2-G mobile subscriber authentication with an
additional feature of network authentication. The HE, which
manages both the AUC and the USIM, possesses some
technique in the management of sequence numbers.
In 3-G mobile communication, voice communication is
held by MSC and its accessories. In packet switching,
authentication is done separately by PDSN servers [6]-[9].
In circuit switching, the authentication for establishing
voice path is done by the following procedure,
1. Mutual authentication where MS and MSC are confirmed
identity individually.
2. Assure that the authentication information and keys are
not being re-used (key freshness).
Additional parameters and cryptographic checks are
introduced in 3-G network to provide mutual entity
authentication between the USIM at the user side and the
AUC at the network side. This technique uses symmetric key
or code using a secret subscriber authentication key K which
is shared between and available only to the USIM and the
AUC in the users HE (Home Environment). In addition, the
AUC entrusts with track of a counter SQNHE and at the same
time USIM controls track of a counter SQNMS. It also stores
additional data to support network authentication providing
the user with assurance by key freshness.
This scheme is assembled of a challenge/response protocol
identical to the 2-G mobile subscriber authentication with an
additional feature of network authentication. The HE, which
manages both the AUC and the USIM, possesses some
technique in the management of sequence numbers.
This scheme is assembled of a challenge/response protocol
identical to the 2-G mobile subscriber authentication with an
additional feature of network authentication. The HE, which
manages both the AUC and the USIM, possesses some
technique in the management of sequence numbers.
2.4. Computes an expected response XRES = f2K (RAND),
where f2 is a (possibly modified) message authentication
function;
2.5. Computes a cipher key CK = f3K (RAND), integrity
key IK = f4K (RAND) and anonymity key AK = f5K (RAND),
where f3, f4, f5 are key generating functions.
2.6. Computes the concealed sequence number SQN AK.
2.7. Assembles the authentication token AUTN =
SQN [ AK] || AMF || MAC-A and the quintet Q = (RAND,
XRES, CK, IK, AUTN) and updates the counter SQNHE.
3. AUC sends that ordered array of n quintets to the VLR.
4. When the VLR initiates the authentication scheme it
selects the next quintet from an array held in the VLR and
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August, 2009
1793-8201
- 220 -
sends the parameters RAND and AUTN to the user.
5. After receiving of a (RAND, AUTN) from the VLR,
USIM in MS computes the following procedure:
5.1 If the sequence number is concealed, the USIM
computes the anonymity key AK = f5K (RAND) and
retrieves from AUTN the unconcealed sequence number
SQN = (SQN AK).
5.2 The USIM then computes XMAC-A = f1K (SQN ||
RAND || AMF) and compares XMAC-A with MAC-A
which is included in AUTN.
5.3 If they are not matching i.e. MAC-A XMAC-A, the
USIM directs the MS to fail a user authentication response
with indication of integrity failure to the VLR and cancels
the further execution.
If they are matched i.e. MAC-A = XMAC-A, the USIM
computes the following:
5.4 The USIM verifies that the received sequence number
SQN is acceptable or not.
5.5 If the sequence number SQN is not acceptable, the
USIM computes the re-synchronization token AUTS and
directs the MS to fail a user authentication response, with an
indication of synchronization failure, including the
re-synchronization token AUTS and abandons the
procedure.
If SQN is acceptable, the USIM progresses through the
following procedures:
5.6 The USIM then computes the response RES =
f2K(RAND) and directs the MS to send back a user
authentication response back to the VLR, with an indication
of successful receipt of the signed challenge and including
the response RES.
6. The VLR compares the received RES with XRES. If
they identical, the VLR confirms that the MS (USIM) is
authentic and therefore authentication proceeding is
successfully completed.
B. Authentication for Packet Switching in 3G network:
Authentication for packet switching is done by AAA
(Authentication, Authorization and Accounting) server [2],
[6]-[9]. Authentication requires the user to provide an
account number or identifier and password i.e. exchange of
logical keys or certificates between the client (MS) and the
server in PDSN. If this authentication is correct, then MS is
permitted for packet data service by Authorization.
An AAA server is a server program that handles user
requests for access to network resources. The AAA server
typically interacts with network access and gateway servers
and with databases and directories containing user
information.
V. PROPOSED AUTHENTICATION SCHEME FOR
PACKET SWITCHED NETWORK
The entire packet switched mobile network
authentication and improvements provide only one-way
authentication i.e. only Servers in PDSN can check the
authenticity of a user. The user can not check whether he is
communicating with a correct server in PDSN or not. It is a
vital gap where a potential adversary can spoof the servers in
PDSN and get valuable user information. This motivates to
construct an authentication scheme for packet switched
mobile network that provides user and server authentication
and the user gets access to the network resource only if <user,
server>s authenticity is passed correctly. The authenticity of
user can be checked by different entities as in following
procedures:
(i) Using log identifier with password for authentication of
mobile subscriber.
(ii) Certified authority server checks the authenticity of
subscriber (MS).
(iii) Different biometric authentication is a technique to
check a valid user by user physical characteristic. Human
physical characteristics are called Biometric property such as
Fingerprint, Voiceprint, Retinal scan and Face recognition etc.
Out of these biometric characteristics, we emphasis on
following areas:
(A) Acoustic Recognition: In this process, sound detecting
from ear of the mobile subscriber (MS) is done by biometric
authentication method. Ear not only senses sound but also
makes signals of its own called OAEs (Otoacoustic Emission).
These OAEs are produced by the motion of hair cells within
the outer part of the spiral shaped cochlea lying in the inner
ear. Hearing is an active process where the ear actually puts
energy into the incoming sound waves to replace energy lost
as sound which is absorbed by the ears function. Due to this
process some of the energy added by the hair cells escape as
OAEs. These OAE signals are detectable by supersensitive
(ultra low noise) microphone. These signals prove unique to
each individual including male, female etc. Thus this can be
used as an authenticity marker for a caller or set of callers
using MS to the network either in circuit or packet switching
cases. Hence the use of stolen mobile can be automatically
disabled in case of the users are not legitimate owner by
simply matching the stored specimen of OAEs.
(B) Face recognition: Face images of the mobile equipment
(MS) users are stored either in AUC or PDSN server. The MS
(mobile caller) is authenticated by matching the face image of
actual user with that of the notified users in MSC or PDSN
database. If these two images are completely matched, the call
will be progressed, otherwise not.
Authenticity of the network or server (MSC or PDSN) is
identified by MS through the following procedure:
(i) Response and throughput time of the server.
(ii) Shared secret key pairs between the user and the server.
(iii) Received power level from the server.
VI. CONCLUSION
3-G mobile network is completely described above with
the present authentication scheme. It is seen that wireless
communication is enhanced in packet switching technology,
as a result high speed secured data as well as voice
transmission-reception is possible. Our future work is to
invent new efficient mutual authentication technique using
entities like Password, Identifier, Certified Authority,
Biometric Property etc. of the subscriber in both circuit
International Journal of Computer Theory and Engineering, Vol. 1, No. 3, August, 2009
1793-8201
- 221 -
switching and packet switching mobile communications.
REFERENCES
[1] C. T. Bhunia, Information Technology Network and Internet, New
Age International Publishers, India, 5th Edition (Reprint), 2006.
[2] William C. Y. Lee, Wireless and Cellular Communications, 3rd
Edition McGraw Hill Publishers 2008.
[3] P. K. Bhattacharjee, A New Era in Mobile Communications- GSM
and CDMA in National Conference on Wireless and Optical
Communications (WOC-07) at Punjab Engg College (D.U), pp 118-
126, on 13th- 14th Dec, 2007.
[4] T. S. Rappaport, Wireless Communication: Principles and Practice,
Prentice Hall Pub Ltd, 2nd Ed, 2006.
[5] P. K. Bhattacharjee, Hybrid GSM And CDMA Mobile
Communication Systems Enhancing Channel Capacity National
Conference on Wireless and Optical Communications (WOC-08),
Punjab Engineering College (Deemed University), Chandigarh with
IEEE, pp 1-8, from 18-19th Dec, 2008.
[6] D. Goodman, Cellular Packet Communication, IEEETransactions
on Communications, vol. 38, no. 8, pp. 1272-1280, August1990.
[7] S. N. Diggavi, N. Al-Dhahir, A. Stamoulis, R. Calderbank, Great
Expectations: The Value of Spatial Diversity in Wireless Networks,
Proceedings of the IEEE, Volume 92, Issue 2, pp. 219270, Feb 2004.
[8] P. Ramjee, O. Tero, An Overview of CDMA Evolution towards
Wideband CDMA, IEEE Communications Survey, 1998.
[9] F. Adachi, M. Sawahashi, H. Suda, Wideband DS-CDMA for Next
Generation Mobile Communications System, IEEE Communication
Magazine, pp 56-69, Sept, 1998.
... Data rates reach upto 2 Mbps or more for 3-G mobile communications, opening opportunities for extensive wireless multimedia services. Enabling packet data services off the RAN (Radio Access Network) in UMTS (Universal Mobile Telecommunication System in USA) and by passing the MSC is the beginning step for separating the circuit based world of the PSTN and the packet based world of PDNs (Public Data Networks) and the Internet (Goodman, 1990;Ramjee et al., 1998;Bhattacharjee et al., 2009;Kim et al., 2003). The European counterpart of UMTS is WCDMA (Wideband Code Division Multiple Access), generally marketed as 3GSM. ...
... Data rates reach upto 2 Mbps or more for 3-G mobile communications, opening opportunities for extensive wireless multimedia services. Enabling packet data services off the RAN (Radio Access Network) in UMTS (Universal Mobile Telecommunication System in USA) and by passing the MSC is the beginning step for separating the circuit based world of the PSTN and the packet based world of PDNs (Public Data Networks) and the Internet (Goodman, 1990;Ramjee et al., 1998;Bhattacharjee et al., 2009;Kim et al., 2003). The European counterpart of UMTS is WCDMA (Wideband Code Division Multiple Access), generally marketed as 3GSM. ...
... Architecture of a 3rd Generation wireless network CDMA-2000 or WCDMA is described below in Fig. 1. This 3-G network can provide circuit switched voice service, circuit switched data service like 2-G (CDMA One or GSM) (Bhattacharjee, 2007(Bhattacharjee, , 2008Forouzan, 2006) in addition to this packet switched data and multimedia service (Goodman, 1990;Ramjee et al., 1998;Bhattacharjee et al., 2009) AUC -Authentication Center contains authentication data called K i in 2-G and in 3-G several keys or encryption codes with algorithm for encrypting user speech and data due to security purpose. Billing Center -It provides all sorts of charging or commercial information. ...
Article
Full-text available
Hacking and threats are the common problems in wireless traffic. Authentication of mobile subscribers andnetwork are an important issue to the researchers. Now mobile communication systems 3-G (or advancedGeneration) have been invented to make speedy data communications. 3-G mobile communications use twodifferent switching techniques: circuit switching for voice and low speed data communications, and packetswitching mainly for data communication, but can extend voice communication like VoIP (Voice Over InternetProtocol), video telephony, multimedia service etc. Generally high speed data communication uses packetswitching process through PDSN (Packet Data Serving Node) servers. In this paper, we propose a subscribemessage authentication technique by using digital signature cryptography that examines authenticity of thesubscriber and the network by subscriber’s message only.
... In 3-G mobile communication, voice communication is held by MSC (Main Switching Center) and its accessories. In packet switching, authentication is done separately by PDSN (Packet Data Serving Node) servers [1], [4], [5]. The existing authentication technique is described below. ...
... Authentication for packet switching [3] is done by AAA (Authentication, Authorization and Accounting) server [1], [4], [5]. Authentication requires the user to provide an account number or identifier and password i.e. exchange of logical keys or certificates between the client (MS) and the server in PDSN. ...
Article
Full-text available
An artificial intelligence based mutual authentication system with four entities is developed keeping any eye to enhancing threat and hacking in mobile network. Since voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the salutation or selective words used by a subscriber at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for authentication purpose. Second entity is chosen as frequency of flipping or clapping sound of the subscriber at the time of initializing a call. Then third entity is taken as face image of the calling subscriber. We propose fourth entity as probability of salutation or greeting word from subscriber's talking habit (set of salutation words) whiles the subscriber starts a call. These four entities such as probability of particular range of frequencies for the salutation word, frequency of flipping sound, face image matching of the subscriber, particular salutation or greeting word at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to weightage. We invent a Fuzzy Rule (condition) by Fuzzy operation. If the results obtained from fuzzy operations are satisfied by the invented fuzzy rule, the subscriber (MS) and the network (MSC or PDSN) are mutually authenticated in 3-G mobile communications.
... In 3-G mobile communication, voice communication is held by MSC (Main Switching Center) and its accessories. In packet switching, authentication is done separately by PDSN (Packet Data Serving Node) servers [1], [4], [5]. The existing authentication technique is described below. ...
... Communications Network Authentication for packet switching [3] is done by AAA (Authentication, Authorization and Accounting) server [1], [4], [5]. Authentication requires the user to provide an account number or identifier and password i.e. exchange of logical keys or certificates between the client (MS) and the server in PDSN. ...
Article
Full-text available
Voice frequency pattern is asymmetric just like nature. Although voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for authentication purpose. We propose second entity as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. Third entity is chosen as probable location (place) of the subscriber from the selective locations at the time of initializing a call i.e. distance between the subscriber and the network. These three entities such as probability of particular range of frequencies for the salutation word, particular salutation or greeting word, location at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to the assigned weightage of the relative grades. Then Fuzzy operations are performed on modified relative grades (sets). We invent a Fuzzy Rule (condition). If the results obtained from fuzzy operations are satisfied by the invented fuzzy rule, the subscriber (MS) and the network (MSC or PDSN) is mutually authenticated in 3-G mobile communications.
... Authors in paper [4] have presented various approaches that can be effectively used as an authentication tool in 3G mobile communications. Two main techniques used were Circuit Switching and Packet Switching. ...
Research
Full-text available
The world as we witness today would not have been the same without the revolution brought about by digitalization and Internet connectivity. We cannot think of even a day when we do not use smartphones and gadgets that have become a crucial part of our lives. But as we know, nothing comes at free of cost. With the ever-growing population of mobile subscribers and increasing use of smartphones and cellular devices, communication channels have become congested with flooded with unmanageable traffic. To combat this issue, through this paper, we are proposing a special type of communication system and a novel communicating device called the neural communicator that will make the communication process work in a decentralized fashion. The system will not require any connection with a common station for broadcasting its request in order to call someone. The devices work in the transceiver mode. The whole system enables the construction of its communication path at runtime that can change dynamically based on other available devices in its periphery. Thus, our proposed neural communicator resolves the issue of increased clogging in the communication channel due to a rise in the population where the existing traditional communication system does not suffice.
... Since information (voice, message, data, image etc) are routed in the cell (network), any node within or beyond the cell can monitor or tamper the information. To avoid hacking or corrupting information, certain authentication (security) [9] schemes in the VANET communications are to be taken. Now four entities mutual authentication technique is proposed for identifying correct nodes (subscribers) as well as a node or a basic mobile network or other networks. ...
Article
Full-text available
Hacking and threats are increasing with the enhanced population of wireless traffic. Authentication of correct mobile nodes in Vehicular Ad Hoc Network is an extremely challenging issue to the researchers. Vehicular Ad Hoc Network (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person can hack or tamper the information. In this paper, a mutual authentication technique is proposed which verifies the authenticity of the calling and the called subscribers (nodes or vehicle drivers) as well as the calling node with the network by calling subscriber's password, SIM and biometric properties of the calling subscriber. Two biometric parameters are used in which one biometric parameter is stored in his own node and the other biometric parameter taken as frequency of Flipping or Clapping sound of each subscriber, called certified document (CD), is stored at the other nodes or the server (PDSN or MSC). An algorithm is developed by these four entities to check this authentication process, named four entities mutual authentication technique for Vehicular Ad Hoc Network (VANET).
... In traditional mobile network, the authenticity of a subscriber [2] is only checked by the server at the time of setting up the communication or call. The server checks the genuineness of a subscriber by applying cryptographic algorithms and functions [4], but the authenticity of the subscriber messages are not checked by the server or switch. ...
Article
Full-text available
Authentication of mobile subscriber’s messages is a challenging issue for future researchers due to increasing security threats and attacks. Next generation mobile communication system has been developed for introducing several new messaging systems having increased volume of data. In the entire authentication techniques in mobile communications, the authenticity of a subscriber is checked by the server or switch at the starting time up of communication (call). These authentication techniques are based on application of cryptographic algorithms and functions for subscriber’s authentication, but do not provide any message authentication method. In this paper, we propose an artificial intelligence based subscriber message authentication scheme. Message server performs a feasibility study of subscriber writing characteristics i.e. writing habit or style from subscriber’s past messages. It assigns different relative grades according to the appearance in the past messages i.e. frequency of sentences, idioms with salutation words and phrasal verbs appearing like most frequently, more frequently, less frequently used sentences, idioms with salutations and phrasal verbs in those messages. It ascertains the theory of artificial intelligence and thereof derives fuzzy sets from the relative grades which are obtained from number of occurrence of those sentences or idioms or phrasal verbs in a message. Now applying fuzzy operations on fuzzy sets, the server or switch validates the authenticity of a subscriber. This paper also reports how human intelligence can be efficiently introduced to a message server for checking authenticity of the subscribers.
... Since information (voice, message, data, image etc) are routed in the cell (network), any node within or beyond the cell can monitor or tamper the information. To avoid tampering or hacking, certain authentication (security) [10] measures in the VANET communications are to be implied. ...
Article
Full-text available
Vehicular Ad Hoc Network (VANET) is one of the wireless ad hoc networks which are based on IEEE 802.11 wireless standard enabling vehicle to vehicle and vehicle to roadside communications through air interface. Information (voice, message, data, image etc) are routed in the cells or networks, any node or person can hack or tamper the information. A new artificial intelligence based mutual authentication technique is developed. Since human voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber (driver of a vehicle or node) at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for the authentication purpose. Second entity is taken as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. Third entity is chosen as probable location (place) of the subscriber (node or vehicle) from the selective locations at the time of initializing a call i.e. distance between the subscriber and the network. These three entities such as probability of particular range of frequencies for the salutation word, particular salutation or greeting word, location at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber (node) like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to the assigned weightage of the relative grades. Then Fuzzy operations are performed on modified relative grades (sets). A Fuzzy Rule (condition) is invented. If the results obtained from fuzzy operations are satisfied by the fuzzy rule, the nodes (vehicles) or a node and the server (switch) are mutually authenticated in a Vehicular Ad Hoc Network.
Article
Full-text available
Cellular mobile communications have brought forth a massive change in telecommunications field due to introducing digital electronics switching and optical fibre as well as microwave and satellite links technologies through the world. Now people have all communications facilities and opportunities to step in the super fast mobile communications age with very high speed data communications facility from 2-G to 3-G and henceforth it is building the path from 3-G to 4-G mobile communications also. A great mobile communications revolution happens throughout the world-whose direct impact is that communications in different forms like voice, data, image, conference, multimedia etc. Are available for all at any time anywhere with a minimum price.
Article
4-G mobile communications system is offering high speed data communications technology having connectivity to all sorts of the networks including 2-G and 3-G mobile networks. Authentication of a mobile subscriber (MS) or a subnetwork and a main network are an important issue to check and minimize security threats or attacks. An advanced artificial intelligence based mutual authentication system applying fuzzy neural network with four entities is proposed. Voice frequency of the salutation or the selective words used by a subscriber like Hello, Good Morning, etc. is taken as first entity. Second entity is chosen as thumb fingerprint matching of the calling subscriber with his/her stored thumb fingerprint. Then third entity is taken as face image matching of the calling subscriber. Fourth entity is granted as probability of the salutation word from subscriber's talking habit while initializing a call. These four entities such as probability of particular range of frequencies for the salutation word, the thumb fingerprint matching, the face image matching of the subscriber, using particular salutation or greeting word at the time of starting a call are used with the most frequently, more frequently, and less frequently by the calling subscriber like uncertainty in Artificial Intelligence. Now different relative grades are assigned to the most frequently, more frequently, and less frequently used parameters. Fuzzy operations such as intersection and union are computed taking three membership functions at a time out of four membership functions to adopt fuzzy neural network. Thereafter, the optimum or the final fuzzy operations are computed according to the assumed weightages. Lastly, the optimized fuzzy operations are defuzzified by the Composite Maxima method and the results are tested according to the invented fuzzy neural rule. If the results are satisfactory, the subscriber or the sub-network and the network (the switch or the server) are mutually authenticated in 4-G mobile communications.
Conference Paper
Full-text available
This paper presents about the “Tracer Study Report “which is an evaluation of CST graduates and existing degree program offered at CST. Being the only College of Engineering in the country, it has become very important for CST to evaluate its program with respect to the demand of modern and Bhutanese society so as to make them effective. The survey was carried out between 13 -18 May 2007. The report is based on the deductive method of surveying. There are two groups that are very much concerned with the survey, one comprises of our graduates working with various organizations and the other comprises of employers of CST graduates. Different set up questionnaires were prepared for graduates and employers and they were asked for their responses. We also had direct contact and talked with them and their feed backs are also presented in the report. The responses are evaluated and findings presented in this report. The report flashes over some areas that the graduates and employers felt to be rectified.
Article
Full-text available
The effect of spatial diversity on the throughput and reliability of wireless networks is examined. Spatial diversity is realized through multiple independently fading transmit/receive antenna paths in single-user communication and through independently fading links in multiuser communication. Adopting spatial diversity as a central theme, we start by studying its information-theoretic foundations, then we illustrate its benefits across the physical (signal transmission/coding and receiver signal processing) and networking (resource allocation, routing, and applications) layers. Throughout the paper, we discuss engineering intuition and tradeoffs, emphasizing the strong interactions between the various network functionalities.
Article
Third-generation mobile radio networks, often dubbed as 3G, have been under intense research and discussion recently and will emerge around the year 2000. In the International Telecommunications Union (ITU), third generation networks are called International Mobile Telecommunications-2000 (IMT-2000), and in Europe, Universal Mobile Telecommunications System (UMTS). IMT-2000 will provide a multitude of services, especially multimedia and high-bit-rate packet data. Wideband code division multiple access (CDMA) has emerged as the mainstream air interface solution for the third-generation networks. In Europe, Japan, Korea, and the United States, wideband CDMA systems are currently being standarized. This article provides a comprehensive introduction to wideband CDMA. It also provides a review of the wideband CDMA air interface proposals including WCDMA in Europe and Japan, cdma2000 in the United States, and wideband CDMA in Korea.
Article
Wideband wireless access based on direct sequence code division multiple access aimed at third-generation mobile communications systems is reviewed. W-CDMA is designed to flexibly offer wideband services which cannot be provided by present cellular systems, with various data rates as high as 2 Mb/s. The important concept of W-CDMA is the introduction of intercell asynchronous operation and the pilot channel associated with individual data channels. Intercell asynchronous operation facilitates continuous system deployment from outdoors to indoors. Other technical features of W-CDMA include fast cell search under intercell asynchronous operation, fast transmit power control, coherent spreading code tracking, a coherent RAKE receiver, orthogonal multispreading factor forward link, and variable-rate transmission with blind rate detection. The introduction of the data-channel-associated pilot channel allows W-CDMA to support interference cancellation and adaptive antenna array techniques that can significantly increase the link capacity and coverage. This article presents the radio link performance evaluated by computer simulation. Field experiment radio link performance results are also presented
Article
The future of third-generation wireless networking is discussed. The vision of the third generation is a single set of standards that can meet a wide range of wireless access applications. Third-generation systems, in harmony with broadband integrated services digital networks, will use shared resources to convey many information types. A single network architecture will serve its users efficiently in many environments, including moving vehicles, indoor and outdoor public areas, residences, offices, and factories. A study of a switching architecture, referred to as a cellular packet switch, and a packet transmission technique, referred to as a packet reservation multiple access is discussed. By means of a design example, it is shown how these techniques can work together to meet some of the demands of third-generation systems
Wireless and Cellular Communications
  • C Y William
  • Lee
William C. Y. Lee, Wireless and Cellular Communications, 3rd Edition McGraw Hill Publishers 2008.
A New Era in Mobile Communications-GSM and CDMA
  • P K Bhattacharjee
P. K. Bhattacharjee, "A New Era in Mobile Communications-GSM and CDMA" in National Conference on Wireless and Optical Communications (WOC-07) at Punjab Engg College (D.U), pp 118-126, on 13 th -14 th Dec, 2007.
Hybrid GSM And CDMA Mobile Communication Systems Enhancing Channel Capacity
  • P K Bhattacharjee
P. K. Bhattacharjee, "Hybrid GSM And CDMA Mobile Communication Systems Enhancing Channel Capacity" National Conference on Wireless and Optical Communications (WOC-08), Punjab Engineering College (Deemed University), Chandigarh with IEEE, pp 1-8, from 18-19 th Dec, 2008.