2009 First International Workshop on Education Technology and Computer Science 2009
DOI: 10.1109/etcs.2009.424
|View full text |Cite
|
Sign up to set email alerts
|

An improved Authentication and Key Agreement Protocol of 3G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In the literature, there are many researches related to the authentication in 3G network or WLAN , but there are still some problems, and most of them did not provide the complete solution to the convergence environment. For example, the approach in alleviates the additional cost in 3GPP TS 33.234 by simplifying the second phase in the EAP‐AKA scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, there are many researches related to the authentication in 3G network or WLAN , but there are still some problems, and most of them did not provide the complete solution to the convergence environment. For example, the approach in alleviates the additional cost in 3GPP TS 33.234 by simplifying the second phase in the EAP‐AKA scheme.…”
Section: Related Workmentioning
confidence: 99%
“…There is another discussion which improves the 3GPP authentication scheme in . It provides mutual authentication and secure transmission by the authenticating vector.…”
Section: Related Workmentioning
confidence: 99%
“…Assume that there are n mobile nodes (clients) and a powerful node U 0 . Assume that each client U i (1 ≤ i ≤ n) has already authenticated mutually to the powerful node U 0 by using some remote user authentication protocols [21][22][23]. Hence, this protocol can be applied to cellular or imbalanced wireless networks.…”
Section: New Group Key Agreement Protocol With Dynamic Joining/leavingmentioning
confidence: 99%
“…To provide dynamic member joining/leaving, we propose a secure and dynamic GKA protocol that is well suited for imbalanced wireless networks in terms of computation cost. We assume that each client and the powerful node have already authenticated mutually using some remote user authentication protocols [21][22][23]. For security analysis, we demonstrate that the proposed protocol is secure against passive attacks under the decision Diffi e-Hellman problem [24,25] and the hash function assumptions.…”
mentioning
confidence: 99%