An effective AKA protocol for UMTS

被引:1
|
作者
Ou, Hsia-Hung [3 ]
Lin, Iuon-Chang [2 ]
Hwang, Min-Shiang [1 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[3] Natl Taiwan Sport Univ, Grad Inst Int Sports Affairs, Guishan Township 333, Taoyuan County, Taiwan
关键词
UMTS; AKA; authentication; key agreement; AUTHENTICATION PROTOCOL; KEY AGREEMENT; MOBILE;
D O I
10.1504/IJMC.2012.048139
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Universal Mobile Telecommunication System (UMTS) is the most popular third-generation mobile phone system at present and the UMTS AKA is authentication and key agreement protocol. There are some weaknesses in the existing UMTS AKA protocol, such as synchronisation question, storage overhead, insecurity with leakiness authentication vector and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol can not only resist the above-mentioned drawback of the original UMTS AKA protocol on the security, but also improve the performance of UMTS AKA protocol, including the computational overhead, storage overhead and communication overhead.
引用
收藏
页码:427 / 448
页数:22
相关论文
共 50 条
  • [31] A new authentication protocol for GSM and UMTS networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    [J]. PROCEEDINGS OF THE 17TH IASTED INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, 2006, : 128 - +
  • [32] A New Authentication Protocol for UMTS Mobile Networks
    Ja'afer Al-Saraireh
    Sufian Yousef
    [J]. EURASIP Journal on Wireless Communications and Networking, 2006
  • [33] A new authentication protocol for UMTS mobile networks
    Al-Saraireh, Ja'afer
    Yousef, Sufian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [34] SDU discard function of RLC protocol in UMTS
    Krichl, Vit
    [J]. PERSONAL WIRELESS COMMUNICATIONS, 2007, 245 : 252 - +
  • [35] A cocktail protocol with the Authentication and Key Agreement on the UMTS
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (02) : 316 - 325
  • [36] An Extended Authentication and Key Agreement Protocol of UMTS
    Farhat, Farshid
    Salimi, Somayeh
    Salahi, Ahmad
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2009, 5451 : 230 - 244
  • [37] Research on Secure Payment Model Based on Improved AKA Protocol
    Wang, Ying
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL FORUM ON MECHANICAL, CONTROL AND AUTOMATION (IFMCA 2016), 2017, 113 : 314 - 318
  • [38] Improved EAP-AKA Protocol Based on Redirection Defense
    Yu, Binbin
    Zhang, Jianwu
    Wu, Zhendong
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 543 - 547
  • [39] LTE Authentication Protocol (EPS-AKA) Weaknesses Solution
    Abdrabou, Mohammed Aly
    Elbayoumy, Ashraf Diaa Eldien
    Abd El-Wanis, Essam
    [J]. 2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 434 - 441
  • [40] A Fast and Secure AKA Protocol for B5G
    Wu, Jung-Hsien
    Yang, Jie-Yu
    Chang, Yu-Ching
    Sun, Min-Te
    [J]. 51ST INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS PROCEEDINGS, ICPP 2022, 2022,