2021
DOI: 10.1109/access.2021.3094045
|View full text |Cite
|
Sign up to set email alerts
|

Reducing the Overhead Messages Cost of the SAK-AKA Authentication Scheme for 4G/5G Mobile Networks

Abstract: One of the recently proposed authentication schemes for 4G/5G mobile networks is a secure anonymity key of authentication and key agreement scheme (SAK-AKA), wherein the home subscriber server (HSS), mobility management entity (MME), and user equipment (UE) represent authentication entities. In the SAK-AKA scheme, UE authentication is performed through an initial authentication processes session (IAPS) and subsequent authentication processes session (SAPS) phases to ensure that the UE is authorized to use the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…the key agreement and authentication, the anticipated costs of operating time and intercommunication were calculated, while the costsof the required storage capacity were calculated for the phases of sensor registration, cluster head, and agriculture professional, stages of sensor registration and cluster head. The following values were used in order to conduct reasonable and appropriate comparisons [10,17,19,21]:…”
Section: Comparison With Other Schemesmentioning
confidence: 99%
“…the key agreement and authentication, the anticipated costs of operating time and intercommunication were calculated, while the costsof the required storage capacity were calculated for the phases of sensor registration, cluster head, and agriculture professional, stages of sensor registration and cluster head. The following values were used in order to conduct reasonable and appropriate comparisons [10,17,19,21]:…”
Section: Comparison With Other Schemesmentioning
confidence: 99%
“…The estimated costs of the running time and intercommunication were computed for the authentication and key agreement phase, whereas the cost of the storage size needed was computed for the agriculture professional, cluster head, and sensor registration phases. In order to carry out accurate and reasonable comparisons, the following values were assumed [10,17,19,21]:…”
Section: Performance Analysismentioning
confidence: 99%