Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2014
DOI: 10.5121/csit.2014.41206
|View full text |Cite
|
Sign up to set email alerts
|

SEPS-AKA : A Secure Evolved Packet System Authentication and Key Agreement Scheme for LTE - A Networks

Abstract: In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
(29 reference statements)
0
4
0
Order By: Relevance
“…Sandhya et al [14] proposed a mutual authentication scheme based on the SHA algorithm for Long Term Evolution using Hyper-Elliptic Curve Cryptography providing secure communication for data exchange. Haddad et al [15] proposed a secure Authentication and Key Agreement protocol (EPS-AKA) for evolved packet systems in LTE-A networks using Public Key Cryptography (PKC) to provide confidentiality by using RSA as a basis to compute the temporary value for the International Mobile Subscriber Identity (IMSI). Abdo et al [16] proposed a scheme called EPS mutual authentication and cryptanalysis (SPAKA), which based on self-certified protocol.…”
Section: A Related Workmentioning
confidence: 99%
“…Sandhya et al [14] proposed a mutual authentication scheme based on the SHA algorithm for Long Term Evolution using Hyper-Elliptic Curve Cryptography providing secure communication for data exchange. Haddad et al [15] proposed a secure Authentication and Key Agreement protocol (EPS-AKA) for evolved packet systems in LTE-A networks using Public Key Cryptography (PKC) to provide confidentiality by using RSA as a basis to compute the temporary value for the International Mobile Subscriber Identity (IMSI). Abdo et al [16] proposed a scheme called EPS mutual authentication and cryptanalysis (SPAKA), which based on self-certified protocol.…”
Section: A Related Workmentioning
confidence: 99%
“…Building on that, we consider the proposed schemes in References [42,57] are relatively high secure protocols due to their robustness against MITM attacks, in addition to mutual AKA features and independence from trusted third parties. On the other hand, the proposed scheme in References [37,38] are based on PKI cryptosystems, but mobile users only adopted symmetric cryptographic approaches with one-time use of key between mobile user and visited network which leads to low computational cost. However, these schemes and beside the reasonable computational efficiency provide low level of security.…”
Section: Security Requirements and Performance Analysismentioning
confidence: 99%
“…Haddad et al [38] proposed a secure authentication of the EPS-AKA for the LTE-A network using PKC for confidentiality and RSA to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the other side. The aim of this work is to solve the problem of sending the IMSI as a clear text, hence preventing the MME attack.…”
Section: Review Of Pki-based Security For 3gpp Systemsmentioning
confidence: 99%
“…In this part, we evaluate the efficiency of ESE-EPS AKA protocol compared with the original EPS AKA and SEPS AKA in [9] which is the most efficient scheme from a survey of the most recent and important works on AKA techniques based on PKI in [2] as mentioned above. Bandwidth consumption and computational cost as the two comparison criteria will be discussed, respectively.…”
Section: Performance Evaluationmentioning
confidence: 99%