An effective AKA protocol for UMTS

被引:1
|
作者
Ou, Hsia-Hung [3 ]
Lin, Iuon-Chang [2 ]
Hwang, Min-Shiang [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[3] Natl Taiwan Sport Univ, Grad Inst Int Sports Affairs, Guishan Township 333, Taoyuan County, Taiwan
关键词
UMTS; AKA; authentication; key agreement; AUTHENTICATION PROTOCOL; KEY AGREEMENT; MOBILE;
D O I
10.1504/IJMC.2012.048139
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Universal Mobile Telecommunication System (UMTS) is the most popular third-generation mobile phone system at present and the UMTS AKA is authentication and key agreement protocol. There are some weaknesses in the existing UMTS AKA protocol, such as synchronisation question, storage overhead, insecurity with leakiness authentication vector and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol can not only resist the above-mentioned drawback of the original UMTS AKA protocol on the security, but also improve the performance of UMTS AKA protocol, including the computational overhead, storage overhead and communication overhead.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [1] Secure-AKA: An Efficient AKA Protocol for UMTS Networks
    Saxena, Neetesh
    Chaudhari, Narendra S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (02) : 1345 - 1373
  • [2] Secure-AKA: An Efficient AKA Protocol for UMTS Networks
    Neetesh Saxena
    Narendra S. Chaudhari
    [J]. Wireless Personal Communications, 2014, 78 : 1345 - 1373
  • [3] Efficient and Secure Modified Cocktail-AKA Protocol for UMTS Network
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 167 - 172
  • [4] Analyses authentication and key agreement (AKA) protocol for UMTS mobile networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    [J]. MOBILE COMPUTING AND WIRELESS COMMUNICATION INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 46 - 50
  • [5] Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks
    Vizvari, Sharareh
    Berangi, Reza
    Nematollahi, Khosro
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 118 - 123
  • [6] Secure 4G SEPS-AKA Protocol for UMTS Networks
    Suvidha, K. S.
    Kamath, S. S.
    [J]. PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [7] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    [J]. Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [8] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [9] TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS
    Ou, Hsia-Hung
    Lin, Iuon-Chang
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (04) : 291 - 303
  • [10] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012