By Topic

Improved Adaptive Protocol for authentication and key agreement

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shalmany, N.A. ; Electr. Eng. Dept., Sahand Univ. of Technol., Tabriz ; Rahbar, A.G.P.

We explain the authentication and key agreement protocols for third-generation (3G) wireless communications. This protocol is known as 3GPP-AKA. We show this protocol is vulnerable to false base station attacks, and therefore, it needs synchronization between MS (mobile station) and HN (home network) that increases the complexity of system. Then, we analyze two techniques which are called adaptive protocol for AKA and extension of AKA. Any of these techniques eliminate some of the weaknesses of 3GPP-AKA. We combine these two techniques and propose a new technique, called improved adaptive protocol for AKA (IAP-AKA). We show this technique can be a good successor for 3GPP-AKA by eliminating synchronization, bandwidth wastage, and vulnerability to false base station attacks.

Published in:

Telecommunications, 2008. IST 2008. International Symposium on

Date of Conference:

27-28 Aug. 2008