Authentication and key agreement protocol for UMTS with low bandwidth consumption

被引:0
|
作者
Huang, CM [1 ]
Li, JW [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
authentication; confidentiality; integrity; message authentication code;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio interface and wireless service accesses are two areas, in which wireless networks do not provide the same level of protection as wired networks. It may result in the wireless networks being vulnerable to various attacks. For example, the first generation cellular mobile communication systems, such as Advanced Mobile Phone Service (AMPS), and the second generation cellular mobile communication systems, such as Global System for Mobile (GSM), do not take account of security issues comprehensively. It brings about an intruder to be able to eavesdrop user traffic or even change the identities of mobile phones to gain fraudulent services. Therefore, the Universal Mobile Telecommunication System (UMTS), which is known as the third generation (3G) cellular mobile communication system, is proposed. UMTS adopts the security feature of GSM in order to interwork with GSM smoothly. Furthermore,the UMTS adds new security features to design an authentication and key agreement protocol, which is called UMTS AKA protocol. However it is found that the UMTS AKA has some problems, including bandwidth consumption between a serving network and a user's home network, space overhead of the serving network and sequence number synchronization. Therefore, in this paper, we propose an extension of UMTS AKA protocol, called UMTS X-AKA to overcome the aforementioned problems of UMTS AKA.
引用
收藏
页码:392 / 397
页数:6
相关论文
共 50 条
  • [41] Certificateless Handover Authentication and Key Agreement Protocol for Network Slicing
    Wu X.
    Ji W.
    Weng J.
    Li Y.
    Shen X.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (04): : 103 - 108
  • [42] AN AUTHENTICATION AND SESSION KEY AGREEMENT PROTOCOL BASED ON IDENTITY SIGNATURE
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 311 - +
  • [43] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [44] A Beyond-5G Authentication and Key Agreement Protocol
    Damir, Mohamed Taoufiq
    Meskanen, Tommi
    Ramezanian, Sara
    Niemi, Valtteri
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 249 - 264
  • [45] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [46] A New Lightweight Authentication and Key agreement Protocol For Internet of Things
    Arasteh, Sima
    Aghili, Seyed Farhad
    Mala, Hamid
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 52 - 59
  • [47] Multi-party Quantum Key Agreement Protocol with Authentication
    Wu, Yi-Ting
    Chang, Hong
    Guo, Gong-De
    Lin, Song
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (11-12) : 4066 - 4077
  • [48] An Efficient Authentication Key Agreement Protocol with Provable Security for VANET
    Qiao Z.-R.
    Yang Q.-L.
    Zhou Y.-W.
    Yang B.
    Gu C.-X.
    Zhang M.-W.
    Xia Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 929 - 944
  • [49] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [50] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92