An effective AKA protocol for UMTS

被引:1
|
作者
Ou, Hsia-Hung [3 ]
Lin, Iuon-Chang [2 ]
Hwang, Min-Shiang [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[3] Natl Taiwan Sport Univ, Grad Inst Int Sports Affairs, Guishan Township 333, Taoyuan County, Taiwan
关键词
UMTS; AKA; authentication; key agreement; AUTHENTICATION PROTOCOL; KEY AGREEMENT; MOBILE;
D O I
10.1504/IJMC.2012.048139
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Universal Mobile Telecommunication System (UMTS) is the most popular third-generation mobile phone system at present and the UMTS AKA is authentication and key agreement protocol. There are some weaknesses in the existing UMTS AKA protocol, such as synchronisation question, storage overhead, insecurity with leakiness authentication vector and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol can not only resist the above-mentioned drawback of the original UMTS AKA protocol on the security, but also improve the performance of UMTS AKA protocol, including the computational overhead, storage overhead and communication overhead.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [21] Spur: A secured protocol for UMTS registration
    Abdelkader, Manel
    Boudriga, Noureddine
    [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 201 - +
  • [22] A Provable Billing Protocol on the Current UMTS
    Hsia-Hung Ou
    Min-Shiang Hwang
    Jinn-Ke Jan
    [J]. Wireless Personal Communications, 2010, 55 : 551 - 566
  • [23] A Provable Billing Protocol on the Current UMTS
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (04) : 551 - 566
  • [24] The 5G-AKA Authentication Protocol Privacy
    Koutsos, Adrien
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 464 - 479
  • [25] Design and Verification of Security Enhanced IMS AKA Protocol
    Fan, Xin
    Li, Wei
    Chen, Zhihuan
    Liu, Hao
    [J]. 2012 INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATION (ICAIC 2012), 2013, : 261 - 267
  • [26] Study of an improved AKA protocol based on the SIM card
    Jeon, Ha-Yong
    Lee, Yun-Seok
    Jung, Min-Soo
    [J]. ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 564 - 568
  • [27] 基于串空间模型的UMTS AKA协议安全分析与改进
    邢媛
    蒋睿
    [J]. 东南大学学报(自然科学版), 2010, 40 (06) : 1163 - 1168
  • [28] Performance of the MAC-hs protocol in UMTS
    Bestak, R
    [J]. Proceedings of the IASTED International Conference Communication Systems and Networks, 2004, : 112 - 117
  • [29] UMTS protocol development using formal languages
    Morillo-Velarde, V
    Colás, J
    Poncela, J
    Soret, B
    Entrambasaguas, JT
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE COMMUNICATION SYSTEMS AND NETWORKS, 2004, : 274 - 279
  • [30] Verifying a UMTS Protocol Using Spin and EASN
    Luukkainen, Matti
    Shanbhag, Vivek K.
    Gopinath, K.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 118 : 71 - 85