Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
- Autores
- Saraireh, Ja'afer M. al; Saraireh, Saleh S.; Saraireh, Mohammad S.; Nabhan, Mohammad M. al
- Año de publicación
- 2011
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol.
Facultad de Informática - Materia
-
Ciencias Informáticas
Authentication
3G
Security
mobile station - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc/3.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/9700
Ver los metadatos del registro completo
id |
SEDICI_ea3dcac8a5d735ad3cec4e7bc13967d2 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/9700 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Formal Analysis of A Novel Mutual Authentication and Key Agreement ProtocolSaraireh, Ja'afer M. alSaraireh, Saleh S.Saraireh, Mohammad S.Nabhan, Mohammad M. alCiencias InformáticasAuthentication3GSecuritymobile stationThis research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol.Facultad de Informática2011-10info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArticulohttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdf86-92http://sedici.unlp.edu.ar/handle/10915/9700enginfo:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdfinfo:eu-repo/semantics/altIdentifier/issn/1666-6038info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc/3.0/Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T10:50:48Zoai:sedici.unlp.edu.ar:10915/9700Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 10:50:49.017SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
title |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
spellingShingle |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol Saraireh, Ja'afer M. al Ciencias Informáticas Authentication 3G Security mobile station |
title_short |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
title_full |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
title_fullStr |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
title_full_unstemmed |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
title_sort |
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol |
dc.creator.none.fl_str_mv |
Saraireh, Ja'afer M. al Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al |
author |
Saraireh, Ja'afer M. al |
author_facet |
Saraireh, Ja'afer M. al Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al |
author_role |
author |
author2 |
Saraireh, Saleh S. Saraireh, Mohammad S. Nabhan, Mohammad M. al |
author2_role |
author author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas Authentication 3G Security mobile station |
topic |
Ciencias Informáticas Authentication 3G Security mobile station |
dc.description.none.fl_txt_mv |
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol. Facultad de Informática |
description |
This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol. |
publishDate |
2011 |
dc.date.none.fl_str_mv |
2011-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Articulo http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/9700 |
url |
http://sedici.unlp.edu.ar/handle/10915/9700 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct11-6.pdf info:eu-repo/semantics/altIdentifier/issn/1666-6038 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
dc.format.none.fl_str_mv |
application/pdf 86-92 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844615758853701632 |
score |
13.070432 |