Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol

This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mo...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Saraireh, Ja'afer M. al, Saraireh, Saleh S., Saraireh, Mohammad S., Nabhan, Mohammad M. al
Formato: Articulo
Lenguaje:Inglés
Publicado: 2011
Materias:
3G
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/9700
http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdf
Aporte de:
id I19-R120-10915-9700
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
Authentication
3G
Security
mobile station
spellingShingle Ciencias Informáticas
Authentication
3G
Security
mobile station
Saraireh, Ja'afer M. al
Saraireh, Saleh S.
Saraireh, Mohammad S.
Nabhan, Mohammad M. al
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
topic_facet Ciencias Informáticas
Authentication
3G
Security
mobile station
description This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol.
format Articulo
Articulo
author Saraireh, Ja'afer M. al
Saraireh, Saleh S.
Saraireh, Mohammad S.
Nabhan, Mohammad M. al
author_facet Saraireh, Ja'afer M. al
Saraireh, Saleh S.
Saraireh, Mohammad S.
Nabhan, Mohammad M. al
author_sort Saraireh, Ja'afer M. al
title Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
title_short Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
title_full Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
title_fullStr Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
title_full_unstemmed Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
title_sort formal analysis of a novel mutual authentication and key agreement protocol
publishDate 2011
url http://sedici.unlp.edu.ar/handle/10915/9700
http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdf
work_keys_str_mv AT sarairehjaafermal formalanalysisofanovelmutualauthenticationandkeyagreementprotocol
AT sarairehsalehs formalanalysisofanovelmutualauthenticationandkeyagreementprotocol
AT sarairehmohammads formalanalysisofanovelmutualauthenticationandkeyagreementprotocol
AT nabhanmohammadmal formalanalysisofanovelmutualauthenticationandkeyagreementprotocol
bdutipo_str Repositorios
_version_ 1764820492273844229