Authentication and key agreement protocol for UMTS with low bandwidth consumption

被引:0
|
作者
Huang, CM [1 ]
Li, JW [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
authentication; confidentiality; integrity; message authentication code;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio interface and wireless service accesses are two areas, in which wireless networks do not provide the same level of protection as wired networks. It may result in the wireless networks being vulnerable to various attacks. For example, the first generation cellular mobile communication systems, such as Advanced Mobile Phone Service (AMPS), and the second generation cellular mobile communication systems, such as Global System for Mobile (GSM), do not take account of security issues comprehensively. It brings about an intruder to be able to eavesdrop user traffic or even change the identities of mobile phones to gain fraudulent services. Therefore, the Universal Mobile Telecommunication System (UMTS), which is known as the third generation (3G) cellular mobile communication system, is proposed. UMTS adopts the security feature of GSM in order to interwork with GSM smoothly. Furthermore,the UMTS adds new security features to design an authentication and key agreement protocol, which is called UMTS AKA protocol. However it is found that the UMTS AKA has some problems, including bandwidth consumption between a serving network and a user's home network, space overhead of the serving network and sequence number synchronization. Therefore, in this paper, we propose an extension of UMTS AKA protocol, called UMTS X-AKA to overcome the aforementioned problems of UMTS AKA.
引用
收藏
页码:392 / 397
页数:6
相关论文
共 50 条
  • [31] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [32] New low-earth orbit satellites authentication and group key agreement protocol
    Zhang Z.
    Zhou Q.
    Zhang C.
    Tong X.
    Li C.
    Wang L.
    2018, Editorial Board of Journal on Communications (39): : 146 - 154
  • [33] Robust Authentication and Session Key Agreement Protocol for Satellite Communications
    Soltani, Somayeh
    Seno, Seyed Amin Hosseini
    Rejito, Juli
    Budiarto, Rahmat
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 5891 - 5910
  • [34] An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication
    Liu, Zewei
    Hu, Chunqiang
    Ruan, Conghao
    Hu, Pengfei
    Han, Meng
    Yu, Jiguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 22413 - 22428
  • [35] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [36] Security analysis of an authentication and key agreement protocol for satellite communications
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4300 - 4306
  • [37] Cross-domain authentication and the key agreement protocol in VANETs
    Li X.
    Yang D.
    Zheng X.
    Zhu X.
    Chen B.
    Zhang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 141 - 148
  • [38] A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid
    Liu, Zewei
    Hu, Chunqiang
    Ruan, Conghao
    Li, Ruinian
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3288 - 3293
  • [39] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [40] An improved Authentication and Key Agreement Protocol of 3G
    Zheng, Xiankun
    Liu, Changjiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 733 - 737