2013 International Conference on Computer Applications Technology (ICCAT) 2013
DOI: 10.1109/iccat.2013.6521993
|View full text |Cite
|
Sign up to set email alerts
|

EC-AKA2 a revolutionary AKA protocol

Abstract: Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a must. Under all these requirements, 3GPP failed to propose a new Authentication and Key Agreement Protocol that solves the vulnerabilities found in the current AKA, and implement user preferences in network selection,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 6 publications
(2 reference statements)
0
11
0
Order By: Relevance
“…7) EC-AKA2: It was proposed by Jacques Bou Abdou et al to solve the problem of IMSI catching and mobile user tracking in which its purpose is to make this solution capable of fortifying vulnerabilities outside EC-AKA's scope of interest. In fact, the new solution differs from EC-AKA in parameters and restrictions [10].…”
Section: ) Ensured Confidentiality Aka (Ec-aka)mentioning
confidence: 93%
“…7) EC-AKA2: It was proposed by Jacques Bou Abdou et al to solve the problem of IMSI catching and mobile user tracking in which its purpose is to make this solution capable of fortifying vulnerabilities outside EC-AKA's scope of interest. In fact, the new solution differs from EC-AKA in parameters and restrictions [10].…”
Section: ) Ensured Confidentiality Aka (Ec-aka)mentioning
confidence: 93%
“…In [8], Abdo et al define four security weaknesses in the original LTE AKA protocol: IMSI catching, tracking user temporary identity due to linkability and security network authentication. In addition, the authors propose two countermeasures to use in order to solve these problems: Public Key Infrastructure (PKI) and pseudonyms based approaches.…”
Section: Related Workmentioning
confidence: 99%
“…However, comparing with the SEPS-AKA scheme, where an UE is identified mathematically by its IMSI, as mentioned in equations (1), (7), (8), and (9), and the mathematical computation were based on the RSA scheme. The original and the EC-AKA schemes, the transmission of the IMSI gains the probability to different previous attack.…”
Section: Entity Mutual Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Abdo et al [39] defined four security weaknesses in the original LTE AKA protocol: IMSI catching, tracking user temporary identity due to linkability and security network authentication. In addition, the authors proposed two countermeasures to use in order to solve these problems: PKI and pseudonyms based methods.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%