2004
DOI: 10.1109/mwc.2004.1269712
|View full text |Cite
|
Sign up to set email alerts
|

An introduction to access security in UMTS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
1

Year Published

2005
2005
2013
2013

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(32 citation statements)
references
References 0 publications
0
31
0
1
Order By: Relevance
“…It is possible to run the UMTS Authentication and Key Agreement (UMTS-AKA) [8,9] protocol over the "GSM Edge Radio Access Network" (GERAN) if the subscriber has a UICC/USIM module instead of the old GSM SIM. The UMTS AKA protocol is defined in 3GPP TS 33.102 [10] and the functions are shown in Fig.…”
Section: Umts Authentication and Key Agreementmentioning
confidence: 99%
“…It is possible to run the UMTS Authentication and Key Agreement (UMTS-AKA) [8,9] protocol over the "GSM Edge Radio Access Network" (GERAN) if the subscriber has a UICC/USIM module instead of the old GSM SIM. The UMTS AKA protocol is defined in 3GPP TS 33.102 [10] and the functions are shown in Fig.…”
Section: Umts Authentication and Key Agreementmentioning
confidence: 99%
“…In addition to authenticating the subscriber's identity, cipher and integrity session keys are also generated from the long-term preshared secret key stored in the USIM module and Home Location Register/Authentication Centre (HLR/AuC). A good introduction to the access security in 3G networks is given in Koien (2004); Rose and Koien (2004).…”
Section: Enhanced Security Levelmentioning
confidence: 99%
“…UMTS is an evolution of GSM in many aspects including security [22]. Security in UMTS includes enhancements such as mutual authentication and stronger encryption with 128-bit key lengths.…”
Section: B Security In Umtsmentioning
confidence: 99%
“…During the initiation stage, the MS provides the network with its identity, either the IMSI or TMSI. 3 Based on the identity it receives, the network initiates the authentication procedure [22].…”
Section: Aka Protocol In Umtsmentioning
confidence: 99%