2008
DOI: 10.1002/nem.703
|View full text |Cite
|
Sign up to set email alerts
|

TK‐AKA: using temporary key on Authentication and Key Agreement protocol on UMTS

Abstract: Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience In recent years, the third-generation cell phone system has approached maturity The Universal Mobile Telecommunication System (UMTS) IS currently the most widely Used System around the world The Third Generation Partnership Project is equipped with the Authentication and Key Agreement (AKA) protocol to maintain secrecy and security both during the authenticatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…In 2005, Lee et al [13] proposed a three-party verifier-based key agreement protocol in which the server's public key is unnecessary to be involved in the key exchange procedure. So far, lots of key agreement protocols [14][15][16][17][18][19][20][21][22] have been proposed.…”
Section: State Of the Artmentioning
confidence: 99%
“…In 2005, Lee et al [13] proposed a three-party verifier-based key agreement protocol in which the server's public key is unnecessary to be involved in the key exchange procedure. So far, lots of key agreement protocols [14][15][16][17][18][19][20][21][22] have been proposed.…”
Section: State Of the Artmentioning
confidence: 99%
“…The rest of the protocols can be divided into two main categories: (i) security enhancement where protocols try to enhance security of UMTS AKA to resist to a series of attacks and (ii) performance optimisation, where an AKA protocol with low bandwidth consumption for UMTS is proposed in . Reference uses a temporary key on the AKA protocol to reduce authentication costs. Authors in presented an efficient AKA protocol to optimise protocol .…”
Section: Related Workmentioning
confidence: 99%
“…It has been shown that it has two important security flows: the HE cannot recognize the session key shared between the SN and the MS and the usage of time stamps needs the use of a synchronizing infrastructure, which comes with new security challenges. Also, this protocol has been proven inefficient in .…”
Section: Security Analysismentioning
confidence: 99%
“…Even though in the last years, many AKA procedures have been proposed [4][5][6][7][8][9][10][11] for UMTS security; none of them brings significant enhancement. We believe that this is why the standardization body in charge with UMTS technical specifications continues the use of the AKA protocol even in its latest releases [12].…”
Section: Other Security Improvementsmentioning
confidence: 99%
See 1 more Smart Citation