Filters








1,031 Hits in 2.9 sec

Authentication Vector Management for UMTS

Lin-Yi Wu, Yi-Bing Lin
2007 IEEE Transactions on Wireless Communications  
AV for each mutual authentication.  ...  Specifically, the Serving GPRS Support Node (SGSN) in the core network obtains an array of Authentication Vectors (AVs) from the Home Subscriber Server/Authentication Center (HSS/AuC), and consumes one  ...  Specifically, an Authentication Vector (AV) is used for one authentication and key agreement between the SGSN and the MS. Fig. 2 illustrates the message flow for UMTS security.  ... 
doi:10.1109/twc.2007.060245 fatcat:rxrz7wgfwrcx3ctred7maiunaq

Improved Identity Management Protocol for Secure Mobile Cloud Computing

In-Shin Park, Yoon-Deock Lee, Jongpil Jeong
2013 2013 46th Hawaii International Conference on System Sciences  
The increase in mobile network users has caused identity management problems for mobile service providers.  ...  This paper proposes improved IDM3G [8] to solve user ID management and security problems on mobile internet application services over 3G networks along with an additional authentication management protocol  ...  Step 6: USIM/UE (user) transmits Ticket A generated in Step 5 in response to SP's authentication request with UMTS-AKA's authentication vector (Current AV) and message authentication code (MAC1) for data  ... 
doi:10.1109/hicss.2013.262 dblp:conf/hicss/ParkLJ13 fatcat:dyxm764ia5hhvcrxnk72prpcfm

Wireless security: securing mobile UMTS communications from interoperation of GSM

Eric Southern, Abdelkader Ouda, Abdallah Shami
2012 Security and Communication Networks  
This requirement for mobile networks means that integration is required. There are flaws in this integration of GSM into UMTS networks.  ...  An important process used to secure that communication is authentication.  ...  The UMTS MSC requests from the GSM home network the authentication vector (RAND, XRES, K c ). The UMTS MSC receives and then forwards the authentication vector to the UMTS BTS.  ... 
doi:10.1002/sec.674 fatcat:ypdl74ulpvdgrhxyyjdoe3xuvq

Securing USIM-based Mobile Communications from Interoperation of SIMbased Communications

Eric Southern, Abdelkader Ouda, Abdallah Shami
2013 International Journal for Information Security Research  
The evolution of authentication in mobile networks to address the problems in the SIM framework brought about the creation of the USIM protocols used in UMTS, LTE and WiMAX to secure the network from the  ...  Wireless communication allows for easy connectivity of devices without the expensive requirements of laying a physical network.  ...  UMTS home network the authentication vector (RAND,XRES, K c ) which is generated by using the UMTS authentication vector (RAND,XRES, CK, IK, AUTN). (3) GSM MSC receives the GSM authentication vector and  ... 
doi:10.20533/ijisr.2042.4639.2013.0037 fatcat:rmgf3x6lwfds3bhf76sut6pdyq

The UMTS-AKA Protocols for Intelligent Transportation Systems

Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan
2009 EURASIP Journal on Wireless Communications and Networking  
This article attempts to identify a suitable communication system for ITS applications.  ...  We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.  ...  This procedure, in addition to making MS's HE aware of the MS location, can let the SN obtain the AVs (Authentication Vectors) from MS's HE (for authentication with the MS in the future).  ... 
doi:10.1155/2009/267283 fatcat:pz3wb62knfhixjxf66f5qtfif4

Efficient and Secure Authentication and Key Agreement Protocol

Jaafer AL-Saraireh
2011 International Journal of UbiComp  
In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate authentication vectors to its subscribers.  ...  Hence, the traffic for the home network to generate authentication vectors is exponentially decreased, then reducing the authentication times, and setup time as well as improving authentication efficiency  ...  Ja'afer AL-Saraireh is grateful to Applied Science Private University Amman, Jordan, for the full financial support granted to this research project.  ... 
doi:10.5121/iju.2011.2201 fatcat:mlirdzuyjncf7cj5ibsa4p2buu

An effective AKA protocol for UMTS

Hsia Hung Ou, Iuon Chang Lin, Min Shiang Hwang
2012 International Journal of Mobile Communications  
There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications.  ...  UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol.  ...  For this reason, the HE must compute all authentication vectors for future authentication needs and the MS also compute these vectors for authentication.  ... 
doi:10.1504/ijmc.2012.048139 fatcat:orudi52eujal7i6lc34rqtptiq

Symbolic Analysis for Security of Roaming Protocols in Mobile Networks [chapter]

Chunyu Tang, David A. Naumann, Susanne Wetzel
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Both GSM (2G) and UMTS (3G) wireless standards are deployed worldwide.  ...  Like the 4G standard now appearing, these standards provide for mobile devices with differing capabilities to roam between providers or technologies.  ...  an Authentication Management Field (AMF).  ... 
doi:10.1007/978-3-642-31909-9_29 fatcat:67oorztr35bsnax44x5qd77kuu

A New Authentication Protocol for UMTS Mobile Networks

Ja'afer Al-Saraireh, Sufian Yousef
2006 EURASIP Journal on Wireless Communications and Networking  
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed.  ...  In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND).  ...  In Section 3, the UMTS authentication protocol is analyzed. A proposed authentication protocol for UMTS mobile networks is described in Section 4.  ... 
doi:10.1155/wcn/2006/98107 fatcat:nc4qtlenr5cgbhgnguqfbpo4xy

TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS

Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, Jinn-Ke Jan
2009 International Journal of Network Management  
In addition, a more practical AKA protocol for UMTS is presented.  ...  The 3rd Generation Partnership Project is equipped with the Authentication and Key Agreement (AKA) protocol to maintain secret and secure both during the authentication process and during the telecommunication  ...  At the outset, the original UMTS-AKA protocol holds Phase 1 responsible for the computation of the authentication vectors, which can thus be maintained ready for future use when Phase 2 is reached.  ... 
doi:10.1002/nem.703 fatcat:shiynfjxvnasplnwv4ten56p6i

A USIM-Based Uniform Access Authentication Framework in Mobile Communication

Xinghua Li, Jianfeng Ma, YoungHo Park, Li Xu
2011 EURASIP Journal on Wireless Communications and Networking  
For GERAN, SIM card runs GSM authentication algorithm.  ...  While for the UTRAN, LTE, WLAN and WiMAX, they all employ USIM to run the AKA algorithm though their respective authentication protocols are not same.  ...  [35] proposed a unified authentication scheme for BcN wherein an AAA corebroker is positioned in the core network and manages the information for the authentication of the mobile nodes.  ... 
doi:10.1155/2011/867315 fatcat:wzfgd6fc4fcareurgn2p3eecza

Reducing authentication signaling traffic in third-generation mobile network

Yi-Bing Lin, Yuan-Kai Chen
2003 IEEE Transactions on Wireless Communications  
Since the cost for accessing AuC is expensive, the SGSN may obtain an array of authentication vectors (AVs) at a time so that the number of accesses can be reduced.  ...  system (UMTS).  ...  The AuC is used in the security data management for the authentication of subscribers. The AuC may be colocated with the HLR. More details of UMTS and GPRS can be found in [4] and [13] .  ... 
doi:10.1109/twc.2003.811171 fatcat:ppr4ysdoerfpxeaytckjetcvqy

Evaluation of Security Attacks on UMTS Authentication Mechanism

Mojtaba Ayoubi Mobarhan
2012 International journal of network security and its applications  
The evaluations finally show that the authentication factor is more interesting than other factors for hackers.  ...  The study then focuses on network access security mechanism of UMTS, called Authentication and Key Agreement (AKA).  ...  AMF Authentication Management Field is a 16 bit field used for management purposes. MAC Message Authentication Code that is verified by the user.  ... 
doi:10.5121/ijnsa.2012.4403 fatcat:qypglftw7fe7zerp4z7o5yyywi

On the security of wireless network access with enhancements

Lein Harn, Wen-Jung Hsin
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
However, the approach adopted by the two most popular 3G mobile system forerunners, UMTS and cdma2000, leaves many areas for improvement.  ...  In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, and non-repudiation service in a simple and elegant  ...  John Cigas at Rockhurst University for their constructive comments in the initial draft of this paper.  ... 
doi:10.1145/941311.941325 dblp:conf/ws/HarnH03 fatcat:gdspc7pzlzf7dl53cfyepod3pi

On the security of wireless network access with enhancements

Lein Harn, Wen-Jung Hsin
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
However, the approach adopted by the two most popular 3G mobile system forerunners, UMTS and cdma2000, leaves many areas for improvement.  ...  In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, and non-repudiation service in a simple and elegant  ...  John Cigas at Rockhurst University for their constructive comments in the initial draft of this paper.  ... 
doi:10.1145/941322.941325 fatcat:cxwa47zyvja6nadhcyrt73a2wy
« Previous Showing results 1 — 15 out of 1,031 results