2004
DOI: 10.1155/s1687147204403016
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems

Abstract:

While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G). Work has already begun on such an “all-IP” end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
2

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(34 citation statements)
references
References 19 publications
0
32
0
2
Order By: Relevance
“…Kambourakis et al [33] proposed techniques for the existing problems that are related to AKA. This include compromising authentication vector attacks as they appear in current 2/2.5G/3G mobile communication systems, the study also proposed a scheme that combined secure sockets layer (SSL) with PKI elements and protects user's identity IMSI.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Kambourakis et al [33] proposed techniques for the existing problems that are related to AKA. This include compromising authentication vector attacks as they appear in current 2/2.5G/3G mobile communication systems, the study also proposed a scheme that combined secure sockets layer (SSL) with PKI elements and protects user's identity IMSI.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
“…Compared with other AKA for future mobile networks and 3G-AKA, this scheme provides a decent efficiency and relative security to resist potential attacks as well as attacks in heterogeneous network infrastructure. However, this scheme has weaknesses similar to that of [33]. It lacks of internetwork authentication approach and also has relatively high computational cost.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
“…UMTS AKA is a one-pass challenge response protocol. The UMTS authentication mechanism has been studied [7,8,9,10,11], resulting in suggestions for some improvements. The AKA mechanism executes mutual authentication of the user and the network using a symmetric key, K and derives the new cipher and integrity keys.…”
Section: Authentication and Key Agreementmentioning
confidence: 99%
“…The MSISDN number (or numbers) is a telephone number with full international prefix and is associated with the IMSI number in the valid databases. The MSISDN numbers are (generally) public information, while the IMSI number is designed for system internal identification and routing intentions [10,12].…”
Section: International Mobile Subscriber Identitymentioning
confidence: 99%
“…The UMTS authentication mechanism has been thoroughly studied [11,12,13,14,15], resulting in suggestions for some improvements. 3) Security mode set-up procedure: The sequence of message flow that is followed for both ciphering and integrity protection set-up is shown in Fig.…”
Section: ) User Identity Confidentialitymentioning
confidence: 99%