2010
DOI: 10.1016/j.jss.2009.08.019
|View full text |Cite
|
Sign up to set email alerts
|

A cocktail protocol with the Authentication and Key Agreement on the UMTS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…But then, it fails to withstand against the attacks like re-direction and man-in-the-middle. Ou et al [33] dealt successfully with the security defects of UMTS AKA protocol.…”
Section: Related Workmentioning
confidence: 99%
“…But then, it fails to withstand against the attacks like re-direction and man-in-the-middle. Ou et al [33] dealt successfully with the security defects of UMTS AKA protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Reference and reference are Universal Mobile Telecommunications System (UMTS) AKA (in the UMTS network) and EPS AKA (in the LTE network), respectively, which are candidate protocols in the 3GPP standard. The rest of the protocols can be divided into two main categories: (i) security enhancement where protocols try to enhance security of UMTS AKA to resist to a series of attacks and (ii) performance optimisation, where an AKA protocol with low bandwidth consumption for UMTS is proposed in . Reference uses a temporary key on the AKA protocol to reduce authentication costs.…”
Section: Related Workmentioning
confidence: 99%
“…It has been shown that it has two important security flows: the HE cannot recognize the session key shared between the SN and the MS and the usage of time stamps needs the use of a synchronizing infrastructure, which comes with new security challenges. Also, this protocol has been proven inefficient in .…”
Section: Security Analysismentioning
confidence: 99%
“…Even though in the last years, many AKA procedures have been proposed [4][5][6][7][8][9][10][11] for UMTS security; none of them brings significant enhancement. We believe that this is why the standardization body in charge with UMTS technical specifications continues the use of the AKA protocol even in its latest releases [12].…”
Section: Other Security Improvementsmentioning
confidence: 99%
See 1 more Smart Citation