2012
DOI: 10.5121/ijnsa.2012.4413
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

Abstract: Unlike current closed systems such as 2 nd and 3 rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity and thus enhances users' experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Au… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…This UK will be burnt onto the SIM card of the mobile device and will only be used to derive further keys; in other words, it will not be used to encrypt/decrypt any messages, which means that it will not be exposed to intruders. Furthermore, as has initially been highlighted in and then analyzed in and , it is crucial to secure the communication in the core network to provide security in an open and heterogeneous environment such as the one described in Section 2. Therefore, secure connections using VPN or IPSec protocols have to be set between the operational network entities in the core network to protect their transactions.…”
Section: The Proposed Sl‐aka Protocol and Key Hierarchymentioning
confidence: 99%
“…This UK will be burnt onto the SIM card of the mobile device and will only be used to derive further keys; in other words, it will not be used to encrypt/decrypt any messages, which means that it will not be exposed to intruders. Furthermore, as has initially been highlighted in and then analyzed in and , it is crucial to secure the communication in the core network to provide security in an open and heterogeneous environment such as the one described in Section 2. Therefore, secure connections using VPN or IPSec protocols have to be set between the operational network entities in the core network to protect their transactions.…”
Section: The Proposed Sl‐aka Protocol and Key Hierarchymentioning
confidence: 99%
“…More security is needed to satisfy the privacy requirements, which EPS, UMTS (Universal Mobile Telecommunications System) and GSM (Global Systems for Mobile Communications) has failed to ensure [3] [4]. QoS performance is critical in the success of inter-technology handovers, which will be offered by heterogeneous networks [18]. During inter-technology handover, as the delay during identification and authentication at the destination technology increases, the call drop rate increases also.…”
Section: Introductionmentioning
confidence: 99%