A new authentication protocol for GSM and UMTS networks
MS'06 Proceedings of the 17th IASTED international conference on Modelling and simulation
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Analytical model for authentication transmission overhead between entities in mobile networks
Computer Communications
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks
Wireless Personal Communications: An International Journal
An Extended Authentication and Key Agreement Protocol of UMTS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
Security enhancements against UMTS-GSM interworking attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.