2014 Ieee Region 10 Symposium 2014
DOI: 10.1109/tenconspring.2014.6863085
|View full text |Cite
|
Sign up to set email alerts
|

An efficient authentication and key agreement protocol for 4G (LTE) networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 10 publications
0
22
0
Order By: Relevance
“…The EPC framework includes LTE radio base stations (eNB) [31,47] that connect to the control plane components such as > TII-17-2276 < 4 MME, User Plane Gateways such as Packet Data Network Gateway (PDN-GW) & Serving GW (SGW). The MME acts as a Key Distributor (KD) [3][4][5][6][7][8][9] in the LTE. The EPS network holds both MME and SAE [1,2] and connects these two to the E-UTRAN entities over the many-to-many interface via HSS.…”
Section: The Lte Architecture With Ipg-akamentioning
confidence: 99%
“…The EPC framework includes LTE radio base stations (eNB) [31,47] that connect to the control plane components such as > TII-17-2276 < 4 MME, User Plane Gateways such as Packet Data Network Gateway (PDN-GW) & Serving GW (SGW). The MME acts as a Key Distributor (KD) [3][4][5][6][7][8][9] in the LTE. The EPS network holds both MME and SAE [1,2] and connects these two to the E-UTRAN entities over the many-to-many interface via HSS.…”
Section: The Lte Architecture With Ipg-akamentioning
confidence: 99%
“…Efficient EPS-AKA (EEPS-AKA) was proposed to deal with the issue of user identity disclosure [4]. In EEPS-AKA, Extensible Authentication Protocol (EAP)-SPEKE is based on password shared only between peer and authenticator.…”
Section: Analysis Of Eeps-akamentioning
confidence: 99%
“…The EEPS-AKA focuses on the protection of user identity rather than preventing DoS attacks, which can be launched with legitimate UEs. However, the detailed efficiency evaluation and simulation is not performed for EEPS-AKA in [4].…”
Section: Flaws In the Eeps-akamentioning
confidence: 99%
“…Alezabi et al applied Diffie‐Hellman keys to improve the identity protection and session key forward secrecy, but each authentication needs the involvement of HN; it incurs unbearable communication overhead.…”
Section: Umts‐aka and Related Workmentioning
confidence: 99%
“…These 2 approaches inevitably incur high computational load on clients and the heavy communication overhead issue is not addressed. Alezabi et al 16 applied Diffie-Hellman keys to improve the identity protection and session key forward secrecy, but each authentication needs the involvement of HN; it incurs unbearable communication overhead.…”
Section: Related Workmentioning
confidence: 99%