Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mo...
Guardado en:
| Autores principales: | , , , |
|---|---|
| Formato: | Articulo |
| Lenguaje: | Inglés |
| Publicado: |
2011
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/9700 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdf |
| Aporte de: |
| id |
I19-R120-10915-9700 |
|---|---|
| record_format |
dspace |
| institution |
Universidad Nacional de La Plata |
| institution_str |
I-19 |
| repository_str |
R-120 |
| collection |
SEDICI (UNLP) |
| language |
Inglés |
| topic |
Ciencias Informáticas Authentication 3G Security mobile station |
| spellingShingle |
Ciencias Informáticas Authentication 3G Security mobile station Saraireh, Ja'afer M. al Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| topic_facet |
Ciencias Informáticas Authentication 3G Security mobile station |
| description |
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol. |
| format |
Articulo Articulo |
| author |
Saraireh, Ja'afer M. al Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al |
| author_facet |
Saraireh, Ja'afer M. al Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al |
| author_sort |
Saraireh, Ja'afer M. al |
| title |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| title_short |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| title_full |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| title_fullStr |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| title_full_unstemmed |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
| title_sort |
formal analysis of a novel mutual authentication and key agreement protocol |
| publishDate |
2011 |
| url |
http://sedici.unlp.edu.ar/handle/10915/9700 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdf |
| work_keys_str_mv |
AT sarairehjaafermal formalanalysisofanovelmutualauthenticationandkeyagreementprotocol AT sarairehsalehs formalanalysisofanovelmutualauthenticationandkeyagreementprotocol AT sarairehmohammads formalanalysisofanovelmutualauthenticationandkeyagreementprotocol AT nabhanmohammadmal formalanalysisofanovelmutualauthenticationandkeyagreementprotocol |
| bdutipo_str |
Repositorios |
| _version_ |
1764820492273844229 |