By Topic

Improved Adoptable Scheme for Authentication and Key Agreement

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Haitao Li ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Shize Guo ; Kangfeng Zheng ; Zhe Chen
more authors

In this paper, we analyze that authentication and key agreement (AKA) protocol is vulnerable to false base station attacks. We propose a new security scheme which can better securely realize mutual authentication between mobile station (MS) and network by both sides of communication. This scheme, called improved adoptable AKA (IA-AKA), used random number and signature mechanism to achieve the authentication between MS and network. To analyze the proposed protocol, the BAN logic is used to formalize and prove the security of the improved scheme.

Published in:

Management and Service Science, 2009. MASS '09. International Conference on

Date of Conference:

20-22 Sept. 2009