Security Enhancement Using Mutual Authentication in Existing CDMA Systems
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
Abstract— Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way authentication is provided,that is, only a base station authenticates a subscriber.And, CAVE algorithm is prone to cryptographic attacks.This work proposes to implement authentication method using ESA (Enhanced Subscriber Authentication) algorithm instead of CAVE algorithm in the existing CDMA systems. Authentication mechanism using ESA algorithm uses AKA (Authentication and Key Agreement) to enhance security strength and to provide mutual authentication between a base station and a mobile terminal. AKA with 128-bit key adopts the SHA1 hash algorithm to generate authentication value and message encryption keys. Performance analysis of the proposed work is done by calculating the autocorrelation, crosscorrelation of the transmitted voice signal and also the BER (Bit Error Rate) of the system. Thus the proposed work enhances the security strength of the system with increased key strength and bilateral authentication. The proposed scheme can readily be applied to the existing CDMA systems because only the algorithm is replaced but the input parameters remain the same.
Authors and Affiliations
L. Krishna Bharathi1, , Gnanou Florence Sudha2,
An Application of time stamped proxy blind signature in e-voting
Voting is a way for a voter to make a decision or express an opinion or to choose a candidate. E-voting (Electronic Voting) refers to both the electronic means of casting a vote and the electronic means of counting and p...
Ideal Strategy to Improve Datawarehouse Performance
Data warehouse is set up for the benefits of business analysts and executives across all functional areas. The primary goal of data warehouse is to free the information locked up in the operational database so that decis...
Resource Scheduling in Hybrid Grid Environment
This paper deals with the resource scheduling algorithm for multi cluster hybrid grid environment. The combination of both the centralized and decentralized grid environments is collectively called as the hybrid grid env...
A New Method for Finding an Optimal Solution for Transportation Problems
In this paper a new method named ASM-Method is proposed for finding an optimal solution for a wide range of transportation problems, directly. A numerical illustration is established and the optimality of the result yiel...
Ontology driven Pre and Post Ranking based Information Retrieval in Web Search Engines
With the tremendous growth of World Wide Web, it has become necessary to organize the information in such a way that it will make easier for the end users to find the information they want efficiently and accurately. Thi...