2012
DOI: 10.1504/ijmc.2012.048139
|View full text |Cite
|
Sign up to set email alerts
|

An effective AKA protocol for UMTS

Abstract: UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol not only resists above-mentioned drawback of the or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 33 publications
0
0
0
Order By: Relevance