Next Article in Journal
Facial Feature Movements Caused by Various Emotions: Differences According to Sex
Next Article in Special Issue
Smartphone User Identity Verification Using Gait Characteristics
Previous Article in Journal
The Algorithm of Continuous Optimization Based on the Modified Cellular Automaton
Previous Article in Special Issue
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points
Article Menu

Export Article

Open AccessReview
Symmetry 2016, 8(9), 85; https://doi.org/10.3390/sym8090085

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

1
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Gaoxin West Zone, Chengdu 611731, China
2
School of Electronic Engineering, Chengdu University of Information Technology, Xuefu Road, Chengdu 610225, China
*
Author to whom correspondence should be addressed.
Academic Editor: Young-Sik Jeong
Received: 27 June 2016 / Revised: 16 August 2016 / Accepted: 18 August 2016 / Published: 26 August 2016
(This article belongs to the Special Issue Symmetry in Secure Cyber World)
Full-Text   |   PDF [1047 KB, uploaded 26 August 2016]   |  

Abstract

Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA), evolved packet system-authentication and key agreement (EPS-AKA), and long term evolution-authentication and key agreement (LTE-AKA) algorithms for 3rd generation partnership project (3GPP) systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC) which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI) is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving. View Full-Text
Keywords: PKI security; mobile communication security; GSM-authentication and key agreement (AKA) security; CDMA-AKA security; long term evolution-authentication and key agreement (LTE-AKA) security PKI security; mobile communication security; GSM-authentication and key agreement (AKA) security; CDMA-AKA security; long term evolution-authentication and key agreement (LTE-AKA) security
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Ramadan, M.; Du, G.; Li, F.; Xu, C. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems. Symmetry 2016, 8, 85.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top