2017
DOI: 10.1002/dac.3381
|View full text |Cite
|
Sign up to set email alerts
|

An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols

Abstract: SummaryAuthentication and key agreement (AKA) is a challenge-response-like security protocol that uses symmetric-key cryptography to establish authenticated keys between 2 parties. Its application in the third-generation mobile system universal mobile telecommunications system (UMTS) is called UMTS-AKA, and the version applied in the fourth-generation mobile communication system long-term evolution (LTE) is called LTE-AKA. Both UMTS-AKA and LTE-AKA share the same weakness: the network operators need to maintai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In a short summary of the performance comparison both our proposed schemes, Chien's schemes [11,25], and Fang et al's level-2 D2S authentication [12] demand almost negligible computational cost, compared to other PKC-based schemes. However, Chien's schemes [11,25] do not provide anonymity, Fang et al's level-2 D2S authentication [12] does not consider unlinkability, and the D2S group authentication [12] is vulnerable to the single-compromised-device-impersonation attack.…”
Section: The Performance Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…In a short summary of the performance comparison both our proposed schemes, Chien's schemes [11,25], and Fang et al's level-2 D2S authentication [12] demand almost negligible computational cost, compared to other PKC-based schemes. However, Chien's schemes [11,25] do not provide anonymity, Fang et al's level-2 D2S authentication [12] does not consider unlinkability, and the D2S group authentication [12] is vulnerable to the single-compromised-device-impersonation attack.…”
Section: The Performance Evaluationmentioning
confidence: 99%
“…In a short summary of the performance comparison both our proposed schemes, Chien's schemes [11,25], and Fang et al's level-2 D2S authentication [12] demand almost negligible computational cost, compared to other PKC-based schemes. However, Chien's schemes [11,25] do not provide anonymity, Fang et al's level-2 D2S authentication [12] does not consider unlinkability, and the D2S group authentication [12] is vulnerable to the single-compromised-device-impersonation attack. Those pseudonym-bound-certificate schemes [29,31,32] and the pseudonym-bound-CLPK schemes [36] demand much larger computational overhead, which make them much less attractive to the resource-limited devices; additionally, they only provide anonymity but not unlinkability; the process of periodically renewing the certificates or the CLPKs is also very costly.…”
Section: The Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations