Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

Efficient and Secure Authentication and Key Agreement Protocol

Efficient and Secure Authentication and Key Agreement Protocol

ISSN : 0975 – 8992
Journal from gdlhub / 2017-08-14 11:52:33
Oleh : Ja’afer AL-Saraireh, International Journal of UbiComp
Dibuat : 2012-06-25, dengan 1 file

Keyword : 3G, Authentication, Security, Mobile Station, and Authentication Vector.
Subjek : Efficient and Secure Authentication and Key Agreement Protocol
Url : http://airccse.org/journal/iju/papers/2211iju01.pdf
Sumber pengambilan dokumen : Internet

In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate


authentication vectors to its subscribers. Therefore; the home location register and authentication centre


(HLR/AuC) actually suffers from the traffic bottleneck. AKA protocol has been enhanced by generating


temporary key to enable visitor location register (VLR/SGSN) to authenticate mobile station (MS) without


intervention of HLR/AuC. This proposed protocol called Efficient AKA (E-AKA),


The proposed protocol satisfies the security requirements of third generation (3G) mobile networks. In this


research paper the current AKA has been enhanced by reducing the network traffic, signalling message


between entities. This is achieved by reducing a size n array of authentication vector and the number of


messages between MS and HLR/AuC. Hence, the traffic for the home network to generate authentication


vectors is exponentially decreased, then reducing the authentication times, and setup time as well as


improving authentication efficiency. Additionally, a mutual authentication between MS and its Home


Network (HN) and between an MS and the Serving Network (SN) is achieved. A security analysis and


comparison with related work shows that E-AKA is more efficient and a secure authentication is achieved.

Deskripsi Alternatif :

In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate


authentication vectors to its subscribers. Therefore; the home location register and authentication centre


(HLR/AuC) actually suffers from the traffic bottleneck. AKA protocol has been enhanced by generating


temporary key to enable visitor location register (VLR/SGSN) to authenticate mobile station (MS) without


intervention of HLR/AuC. This proposed protocol called Efficient AKA (E-AKA),


The proposed protocol satisfies the security requirements of third generation (3G) mobile networks. In this


research paper the current AKA has been enhanced by reducing the network traffic, signalling message


between entities. This is achieved by reducing a size n array of authentication vector and the number of


messages between MS and HLR/AuC. Hence, the traffic for the home network to generate authentication


vectors is exponentially decreased, then reducing the authentication times, and setup time as well as


improving authentication efficiency. Additionally, a mutual authentication between MS and its Home


Network (HN) and between an MS and the Serving Network (SN) is achieved. A security analysis and


comparison with related work shows that E-AKA is more efficient and a secure authentication is achieved.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiInternational Journal of UbiComp
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: fachruddin

Download...

  • Download hanya untuk member.

    Jurnal 32
    Download Image
    File : Jurnal 32.PDF

    (308269 bytes)