Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
Efficient and Secure Authentication and Key Agreement Protocol
Efficient and Secure Authentication and Key Agreement Protocol
ISSN : 0975 8992Journal from gdlhub / 2017-08-14 11:52:33
Oleh : Jaafer AL-Saraireh, International Journal of UbiComp
Dibuat : 2012-06-25, dengan 1 file
Keyword : 3G, Authentication, Security, Mobile Station, and Authentication Vector.
Subjek : Efficient and Secure Authentication and Key Agreement Protocol
Url : http://airccse.org/journal/iju/papers/2211iju01.pdf
Sumber pengambilan dokumen : Internet
In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate
authentication vectors to its subscribers. Therefore; the home location register and authentication centre
(HLR/AuC) actually suffers from the traffic bottleneck. AKA protocol has been enhanced by generating
temporary key to enable visitor location register (VLR/SGSN) to authenticate mobile station (MS) without
intervention of HLR/AuC. This proposed protocol called Efficient AKA (E-AKA),
The proposed protocol satisfies the security requirements of third generation (3G) mobile networks. In this
research paper the current AKA has been enhanced by reducing the network traffic, signalling message
between entities. This is achieved by reducing a size n array of authentication vector and the number of
messages between MS and HLR/AuC. Hence, the traffic for the home network to generate authentication
vectors is exponentially decreased, then reducing the authentication times, and setup time as well as
improving authentication efficiency. Additionally, a mutual authentication between MS and its Home
Network (HN) and between an MS and the Serving Network (SN) is achieved. A security analysis and
comparison with related work shows that E-AKA is more efficient and a secure authentication is achieved.
In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate
authentication vectors to its subscribers. Therefore; the home location register and authentication centre
(HLR/AuC) actually suffers from the traffic bottleneck. AKA protocol has been enhanced by generating
temporary key to enable visitor location register (VLR/SGSN) to authenticate mobile station (MS) without
intervention of HLR/AuC. This proposed protocol called Efficient AKA (E-AKA),
The proposed protocol satisfies the security requirements of third generation (3G) mobile networks. In this
research paper the current AKA has been enhanced by reducing the network traffic, signalling message
between entities. This is achieved by reducing a size n array of authentication vector and the number of
messages between MS and HLR/AuC. Hence, the traffic for the home network to generate authentication
vectors is exponentially decreased, then reducing the authentication times, and setup time as well as
improving authentication efficiency. Additionally, a mutual authentication between MS and its Home
Network (HN) and between an MS and the Serving Network (SN) is achieved. A security analysis and
comparison with related work shows that E-AKA is more efficient and a secure authentication is achieved.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | International Journal of UbiComp |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
Jurnal 32
File : Jurnal 32.PDF
(308269 bytes)