An effective AKA protocol for UMTS
نویسندگان
چکیده
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol not only resists above-mentioned drawback of the original UMTS AKA protocol on the security, but also can improve the performance of UMTS AKA protocol, including the computational overhead, storage overhead, and communication overhead.
منابع مشابه
An Extended Authentication and Key Agreement Protocol of UMTS
Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...
متن کاملNS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks
In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of e...
متن کاملEAP AKA Authentication January 2003 The introduction of AKA inside
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...
متن کامل3G Networks A solution to Improved Authentication and Key Agreement Protocol
With the development of mobile communication network, the requirements of mobile users for data services are higher and higher, which makes data service become more diversiform and various service providers appear on after the other. As a result, data services increasingly become the main service in mobile network. The Universal Mobile Telecommunications System (UMTS) is one of the new ‘third g...
متن کاملTK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS
Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third generation cell-phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The 3rd Generation Partnership Project is equipped ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJMC
دوره 10 شماره
صفحات -
تاریخ انتشار 2012