2012
DOI: 10.5121/ijnsa.2012.4403
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Security Attacks on UMTS Authentication Mechanism

Abstract: In this study security of internet access over the Third Generation (3G)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…The dynamic routing protocols in such network, find routes between these nodes and allowing packets to be sent on to a further destination network node [6]. The integrated network has unstable infrastructure vulnerability due to absence of wired network deployment in ad hoc network [7][8]. In RIPv2, there is several known security vulnerabilities exist because its routing update message contains a vector of pairs (destination distance) [9][10].…”
Section: Background: Integrated Umts and Wlan Ad Hoc Network Vulnerabilities And Attacksmentioning
confidence: 99%
“…The dynamic routing protocols in such network, find routes between these nodes and allowing packets to be sent on to a further destination network node [6]. The integrated network has unstable infrastructure vulnerability due to absence of wired network deployment in ad hoc network [7][8]. In RIPv2, there is several known security vulnerabilities exist because its routing update message contains a vector of pairs (destination distance) [9][10].…”
Section: Background: Integrated Umts and Wlan Ad Hoc Network Vulnerabilities And Attacksmentioning
confidence: 99%
“…The dynamic routing protocols in such network, find routes between these nodes and allowing packets to be sent on to a further destination network node [6]. The integrated network has an unstable infrastructure vulnerability due to absence of wired network deployment in ad hoc network [7,8]. Most network applications may run in untrusted environment and therefore network may require a robust secure routing protocol.…”
Section: Background: Integrated Umts and Wlan Ad Hoc Network Vulnerabilities And Attacksmentioning
confidence: 99%
“…Figure 10(f)Average jitter versus number of network nodes7) The performance of integrated network on the average hop -count under different security scheme with and without WHA while the number of mobile nodes are increased Figure10(f) shows the average jitter is decreasing with the increasing number of mobile nodes. The average jitter of different security schemes with WHA increases as average packet loss is increased.…”
mentioning
confidence: 99%
“…The GSM specifications team [15,33] proposed new cryptographic mechanisms to improve upon the early algorithmic vulnerabilities that plagued the original 2G authentication design. UMTS improved upon some of the security threats of the earlier GSM specifications to enhance integrity protection and authentication but even these extensions had several security problems [48]. The LTE authentication mechanism [21] builds upon the UMTS security model and introduces an key deriva-tion hierarchy to enhance the security of the pre-shared keys; even these extensions suffered from several security problems [21,32,63].…”
Section: Related Workmentioning
confidence: 99%

Secure Mobile Identities

Chandrasekaran,
Amjad,
Sharma
et al. 2016
Preprint