Next Article in Journal
Facial Feature Movements Caused by Various Emotions: Differences According to Sex
Next Article in Special Issue
Smartphone User Identity Verification Using Gait Characteristics
Previous Article in Journal
The Algorithm of Continuous Optimization Based on the Modified Cellular Automaton
Previous Article in Special Issue
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points
Open AccessReview

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

1
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Gaoxin West Zone, Chengdu 611731, China
2
School of Electronic Engineering, Chengdu University of Information Technology, Xuefu Road, Chengdu 610225, China
*
Author to whom correspondence should be addressed.
Academic Editor: Young-Sik Jeong
Symmetry 2016, 8(9), 85; https://doi.org/10.3390/sym8090085
Received: 27 June 2016 / Revised: 16 August 2016 / Accepted: 18 August 2016 / Published: 26 August 2016
(This article belongs to the Special Issue Symmetry in Secure Cyber World)
Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA), evolved packet system-authentication and key agreement (EPS-AKA), and long term evolution-authentication and key agreement (LTE-AKA) algorithms for 3rd generation partnership project (3GPP) systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC) which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI) is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving. View Full-Text
Keywords: PKI security; mobile communication security; GSM-authentication and key agreement (AKA) security; CDMA-AKA security; long term evolution-authentication and key agreement (LTE-AKA) security PKI security; mobile communication security; GSM-authentication and key agreement (AKA) security; CDMA-AKA security; long term evolution-authentication and key agreement (LTE-AKA) security
Show Figures

Figure 1

MDPI and ACS Style

Ramadan, M.; Du, G.; Li, F.; Xu, C. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems. Symmetry 2016, 8, 85.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop