A new authentication protocol for GSM and UMTS networks
MS'06 Proceedings of the 17th IASTED international conference on Modelling and simulation
Mobile services access and payment through reusable tickets
Computer Communications
An Extended Authentication and Key Agreement Protocol of UMTS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Security enhancements against UMTS-GSM interworking attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Group-Based Authentication and Key Agreement
Wireless Personal Communications: An International Journal
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Wireless Personal Communications: An International Journal
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Radio interface and wireless service accesses are two areas, in which wireless networks do not provide the same level of protection as wired networks. It may result in the wireless networks being vulnerable to various attacks. For example, the first generation cellular mobile communication systems, such as Advanced Mobile Phone Service (AMPS), and the second generation cellularmobile communication systems, such as Global System for Mobile (GSM), do not take account of security issues comprehensively. It brings about an intruder to be able to eavesdrop user traffic or even change the identities of mobile phones to gain fraudulent services. Therefore, the Universal Mobile Telecommunication System (UMTS), which is known as the third generation (3G) cellular mobile communication system, is proposed. UMTS adopts the security feature of GSM in order to interwork with GSM smoothly. Furthermore,the UMTS adds new security features to design an authentication and key agreement protocol, which is called UMTS AKA protocol. However, it is found that the UMTS AKA has some problems, including bandwidth consumption between a serving network and a userýs home network, space overhead of the serving network and sequence number synchronization. Therefore, in this paper, we propose an extension of UMTS AKA protocol, called UMTS X-AKA to overcome the aforementioned problems of UMTS AKA.