2015 IEEE International Conference on Communication Software and Networks (ICCSN) 2015
DOI: 10.1109/iccsn.2015.7296138
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and key agreement scheme for CDMA cellular system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…However, the security issues and the limited computational capabilities in mobile networks will attract more researchers, at least shortly [23], [24]. Additionally, much research has targeted the field of mobile security using PKC cryptosystems such as [25]- [28]. Other research has focused on the idea of server-aided verification schemes such as [29]- [31], and some researchers have proposed digital signatures based on bilinear pairing [32].…”
Section: A Related Workmentioning
confidence: 99%
“…However, the security issues and the limited computational capabilities in mobile networks will attract more researchers, at least shortly [23], [24]. Additionally, much research has targeted the field of mobile security using PKC cryptosystems such as [25]- [28]. Other research has focused on the idea of server-aided verification schemes such as [29]- [31], and some researchers have proposed digital signatures based on bilinear pairing [32].…”
Section: A Related Workmentioning
confidence: 99%
“…To give security [5], the pseudo noise (PN) sequences are passed on with uniform spread or certified independency with the sequence of 1's and 0's. Sporadic sequences [6] other than transmitted an impression of being extraordinary. In Direct-Sequence (DS) CDMA structure, the high transmission limit pseudo-noise code is imitated with the customer signal.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, this review only covered some of many research works that are related to mobile communications security and focus on PKI cryptosystems, in particular the authentication and key agreement approaches, while making reference to the works of many other researchers [50][51][52][53][54][55][56][57][58][59] whose research works proposed ways using this approach to improve many problems facing mobile communications security such as replay, IMSI catcher, and false base station (fake MME) attacks. Their research helped provide authentication, key agreement, user anonymity, and privacy to secure network entities from such attacks.…”
Section: Review Of Symmetric-key Based Security For Mobile Systemsmentioning
confidence: 99%
“…On the other hand, the proposed security schemes in the new cellular systems shown in (Tables 2 and 3, Figure 3) focus on security requirements as well as the computational and communication costs. Building on that, we consider the proposed schemes in References [42,57] are relatively high secure protocols due to their robustness against MITM attacks, in addition to mutual AKA features and independence from trusted third parties. On the other hand, the proposed scheme in References [37,38] are based on PKI cryptosystems, but mobile users only adopted symmetric cryptographic approaches with one-time use of key between mobile user and visited network which leads to low computational cost.…”
Section: Security Requirements and Performance Analysismentioning
confidence: 99%