2012 Symposium on Broadband Networks and Fast Internet (RELABIRA) 2012
DOI: 10.1109/relabira.2012.6235098
|View full text |Cite
|
Sign up to set email alerts
|

Ensured confidentiality authentication and key agreement protocol for EPS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…This is based on establishing a combination of private and public network infrastructure. Accordingly, establishing a private 5G network is the most secure method of isolation while providing a private network on-site and an off-site roaming facility through the MNO, banking on a security protocol such as EPS AKA [176]. However, this protocol does not isolate the traffic from the MNO.…”
Section: Discussionmentioning
confidence: 99%
“…This is based on establishing a combination of private and public network infrastructure. Accordingly, establishing a private 5G network is the most secure method of isolation while providing a private network on-site and an off-site roaming facility through the MNO, banking on a security protocol such as EPS AKA [176]. However, this protocol does not isolate the traffic from the MNO.…”
Section: Discussionmentioning
confidence: 99%
“…Li and Wang proposed a public key-based SE-EPS-AKA scheme for IMSI plaintext transmission, AV risk transmission, and the longterm storage of a shared key K [31]. However, this scheme was also proved to be risky by Abdo et al [32]. Panda and Chattopadhyay proposed an improved authentication scheme for LTE/LTA-A networks based on ECC, ECDH, and the Salasa2o algorithm [33].…”
mentioning
confidence: 99%