By Topic

Study of an Improved AKA Protocol Based on the SIM Card

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ha-Yong Jeon ; Dept. of Comput. Eng., KyungNam Univ., Masan ; Yun-Seok Lee ; Min-Soo Jung

In addition to existing voice call service, the GSM platform has evolved to include various multimedia services and 3G services enabling international roaming. On that ground, safe data transmission and receiving technology and protection of privacy have become the key elements for the GSM service. However, many researchers have pointed out the problems inherent to the security algorithm and protocol for safe data communication using GSM. In this paper, we would like to analyze the security problems associated with the 2nd and 2.5th GSM network environment and consequently propose a security protocol providing safe services in the third generation network environment as well as the second generation network environment. The newly proposed security protocol may provide significantly strengthened security by allowing authentication of SIM users between SIM and ME and authentication among SIM/ME/AuC as well as reduced complexity in key agreement.

Published in:

Convergence and Hybrid Information Technology, 2008. ICHIT '08. International Conference on

Date of Conference:

28-30 Aug. 2008