2010
DOI: 10.1002/ett.1460
|View full text |Cite
|
Sign up to set email alerts
|

On the security of an enhanced UMTS authentication and key agreement protocol

Abstract: In this paper, we propose a practical and secure authentication and key agreement (AKA) scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, 'home network should be partially trusted in an authentication scheme' to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of 'subscriber identity/location confidential' and 'non-repudiation services' are solved in the scheme. The paper provides computational analysis, messages tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…In 2005, Lee et al [13] proposed a three-party verifier-based key agreement protocol in which the server's public key is unnecessary to be involved in the key exchange procedure. So far, lots of key agreement protocols [14][15][16][17][18][19][20][21][22] have been proposed.…”
Section: State Of the Artmentioning
confidence: 99%
“…In 2005, Lee et al [13] proposed a three-party verifier-based key agreement protocol in which the server's public key is unnecessary to be involved in the key exchange procedure. So far, lots of key agreement protocols [14][15][16][17][18][19][20][21][22] have been proposed.…”
Section: State Of the Artmentioning
confidence: 99%
“…Reference and reference are Universal Mobile Telecommunications System (UMTS) AKA (in the UMTS network) and EPS AKA (in the LTE network), respectively, which are candidate protocols in the 3GPP standard. The rest of the protocols can be divided into two main categories: (i) security enhancement where protocols try to enhance security of UMTS AKA to resist to a series of attacks and (ii) performance optimisation, where an AKA protocol with low bandwidth consumption for UMTS is proposed in . Reference uses a temporary key on the AKA protocol to reduce authentication costs.…”
Section: Related Workmentioning
confidence: 99%
“…From the previous reasoning, the optimal length of the AP window is the value of W that minimises (1), which in this case can be obtained by equaling to 0 the first derivative with respect to W . Known that a geometric series can be expressed as…”
Section: Optimal Ap Window Lengthmentioning
confidence: 99%
“…Although security understood as protecting the communication data has been widely studied [1][2][3][4][5][6], guaranteeing the service availability in M2M communication systems still remains as an open field with a lot of work to be carried out.…”
Section: Introductionmentioning
confidence: 99%