Authentication and key agreement protocol for UMTS with low bandwidth consumption

被引:0
|
作者
Huang, CM [1 ]
Li, JW [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
authentication; confidentiality; integrity; message authentication code;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio interface and wireless service accesses are two areas, in which wireless networks do not provide the same level of protection as wired networks. It may result in the wireless networks being vulnerable to various attacks. For example, the first generation cellular mobile communication systems, such as Advanced Mobile Phone Service (AMPS), and the second generation cellular mobile communication systems, such as Global System for Mobile (GSM), do not take account of security issues comprehensively. It brings about an intruder to be able to eavesdrop user traffic or even change the identities of mobile phones to gain fraudulent services. Therefore, the Universal Mobile Telecommunication System (UMTS), which is known as the third generation (3G) cellular mobile communication system, is proposed. UMTS adopts the security feature of GSM in order to interwork with GSM smoothly. Furthermore,the UMTS adds new security features to design an authentication and key agreement protocol, which is called UMTS AKA protocol. However it is found that the UMTS AKA has some problems, including bandwidth consumption between a serving network and a user's home network, space overhead of the serving network and sequence number synchronization. Therefore, in this paper, we propose an extension of UMTS AKA protocol, called UMTS X-AKA to overcome the aforementioned problems of UMTS AKA.
引用
收藏
页码:392 / 397
页数:6
相关论文
共 50 条
  • [1] A cocktail protocol with the Authentication and Key Agreement on the UMTS
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (02) : 316 - 325
  • [2] An Extended Authentication and Key Agreement Protocol of UMTS
    Farhat, Farshid
    Salimi, Somayeh
    Salahi, Ahmad
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2009, 5451 : 230 - 244
  • [3] On the security of an enhanced UMTS authentication and key agreement protocol
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (03): : 99 - 112
  • [4] Security Analysis of a Cocktail Protocol with the Authentication and Key Agreement on the UMTS
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (04) : 366 - 368
  • [5] Analyses authentication and key agreement (AKA) protocol for UMTS mobile networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    MOBILE COMPUTING AND WIRELESS COMMUNICATION INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 46 - 50
  • [6] Enhanced Authentication and Key Agreement Protocol for Improving Security in UMTS Networks
    Ziani, Ahmed
    Medouri, Abdellatif
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 890 - 894
  • [7] TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS
    Ou, Hsia-Hung
    Lin, Iuon-Chang
    Hwang, Min-Shiang
    Jan, Jinn-Ke
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (04) : 291 - 303
  • [8] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [9] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [10] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012