References
- B. Sidhu and H. Singh, "Location management in cellular networks," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 1, no. 1, pp. 49-54, 2007.
- EFORT, "GSM: Global System for Mobile Communications," 2008 [Online]. Available: http://www.efort.com.
- G. K. Patnaik, "GSM mobility management," 2013 [Online]. Available: https://pt.scribd.com/document/271708186/GSM-Mobility-Management-pdf.
- J. W. Lee, "Mobility management using frequently visited location database," in Proceeding of International Conference on Multimedia and Ubiquitous Engineering (MUE), Seoul, Korea, 2007, pp. 159-163.
- S. Wanke, H. Saito, Y. Arakawa, and S. Shimogawa, "User location in picocells: a paging algorithm derived from measured data," IEICE Transactions on Communications, vol. 93, no. 9, pp. 2291-2298, 2010. https://doi.org/10.1587/transcom.E93.B.2291
- C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for the mobile communications," Wireless Networks, vol. 5, no. 4, pp. 231-243, 1999. https://doi.org/10.1023/A:1019103228471
- J. A. P. Singh and M. Karnan, "A dynamic location management scheme for wirless networks using cascaded correlation neural network," International Journal of Computer Theory and Engineering, vol. 2, no. 4, pp 581-585, 2010.
- A. Bar-Noy, I. Kessler, and M. Sidi, "Mobile users: to update or not to update?," Wireless Networks, vol. 1, no. 2, pp. 175-185, 1995. https://doi.org/10.1007/BF01202540
- A. Fanian, M. Berenjkoub, and T. A. Gulliver, "A new mutual authentication protocol for GSM networks," in Proceedings of Canadian Conference on Electrical and Computer Engineering, St. Johns, Canada, 2009, pp. 798-803.
- J. Al-Saraireh and S. Yousef, "Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS)," International Journal of Theoretical and Applied Computer Sciences, vol. 1, no. 1, pp. 109-118, 2006.
- L. Harn and H. Y. Lin," Modification to enhance the security of the GSM protocol," in Proceedings of the 5th National Conference on Information Security, Taipei, Taiwan, 1995, pp. 416-420.
- K. Al-Tawil, A. Akrami, and H. Youssef, "A new authentication protocol for GSM networks," in Proceedings of IEEE 23rd Annual Conference on Local Computer Networks, Boston, MA, 1998, pp. 21-30.
- B. Mallinder, "An overview of the GSM system," in Proceedings of 3rd Nordic Seminar on Digital Land Mobile Radio Communication, Copenhagen, Denmark, 1998, pp. 12-15.
- Y. Jie and D. J. Kadhim, "Performance evaluation of the mobility management towards 4G wireless networks," International Journal of Electronics and Communication Engineering & Technology, vol. 4, no. 5, pp. 1-10, 2013.
- K. Ammayappan, A. Saxena, and A. Negi, "Mutual authentication and key agreement based on elliptic curve cryptography for GSM," in Proceedings of International Conference on Advanced Computing and Communication, Surathkal, India, 2006, pp. 183-186.
- I. F. Akyildiz, J. McNair, J. S. M. Ho, H. Uzunalioglu, and W. Wang, "Mobility management in next-generation wireless systems," Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, 1999. https://doi.org/10.1109/5.775420
- C. C. Lee, I. E. Liao, and M. S. Hwang, "An efficient authentication protocol for mobile communications," Telecommunication Systems, vol. 46, no. 1, pp. 31-41, 2011. https://doi.org/10.1007/s11235-009-9276-4
- P. Acharya and S. S. Singh, "Mobile user's location management using bloom filter," International Journal of Computer Science and Information Technology, vol. 2, no. 3, pp. 1127-1130, 2011.
- C. Selvan and R. Shanmugalakshmi, "Location management techniques to improve QoS in mobile networks using intelligent agent," International Journal on Computer Science and Engineering, vol. 3, no. 1, pp 192-198, 2011.
- J. F. Stach, E. K. Park, and K. Makki, "Performance of an enhanced GSM protocol supporting non-repudiation of service," Computer Communications, vol. 22, no. 7, pp. 675-680, 1999. https://doi.org/10.1016/S0140-3664(99)00010-9
- C. C. Lee, M. S. Hwang, and W. P. Yang, "Extension of authentication protocol for GSM," IEE Proceedings - Communications, vol. 150, no. 2, pp. 91-95, 2003. https://doi.org/10.1049/ip-com:20030290
- W. D. Lin and J. K. Jan, "A wireless-based authentication and anonymous channels for large scale area," in Proceedings of the 6th IEEE Symposium on Computers and Communications (ISCC), Hammamet, Tunisia, 2001, pp. 36-41.
- N. Saxena and N. S. Chaudhari, "Secure-AKA: an efficient AKA protocol for UMTS networks," Wireless Personal Communications, vol. 78, no. 2, pp. 1345-1373, 2014. https://doi.org/10.1007/s11277-014-1821-0
- P. Ravi Kiran and Y. K. Sundara Krishna, "A study report on authentication protocols in GSM, GPRS and UMTS," International Journal of Engineering Research and Development, vol. 10, no. 6, pp. 42-48, 2014.