2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2015
DOI: 10.1109/ecai.2015.7301207
|View full text |Cite
|
Sign up to set email alerts
|

Improving LTE EPS-AKA using the security request vector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Therefore, a contradiction occurs when a HSS cannot retrieve the IMSI, implying that it cannot read the messages from a UE at all. In [5], a solution was proposed to prevent DoS attacks that UE is required to attach its physical address to the authentication request.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, a contradiction occurs when a HSS cannot retrieve the IMSI, implying that it cannot read the messages from a UE at all. In [5], a solution was proposed to prevent DoS attacks that UE is required to attach its physical address to the authentication request.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 summarizes the length of authentication parameters [14]. For EPS-AKA, the bandwidth requirement [18] is given by BW EP S−AKA = (963 + 608n) N avg,AEP H (5) where N avg,AEP H is the average number of authentication event per HSS. Similarly, for the proposed TIA-AKA, the bandwidth requirement is given by where N avg,AEP M is the average number of authentication event per MME.…”
Section: Proposed Tia-akamentioning
confidence: 99%