By Topic

UMTS security: Enhancement of identification, authentication and key agreement protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Caragata, D. ; IREENA: Inst. de Rech. en Electron. et Electrotech. de Nantes Atlantique, Univ. de Nantes, Nantes, France ; El Assad, S. ; Shoniregun, C. ; Akmayeva, G.

Universal Mobile Telecommunications System is the third generation mobile communications system. It was built on the concepts of GSM and is the starting point in the development of the fourth generation network. This paper proposes enhancements for the initial identification and for the Authentication and Key Agreement (AKA) protocols that solve two known vulnerabilities of UMTS security: identity catching and secret key exposure. The solution, inspired from Al Saraireh identification protocol, realizes the encryption of the permanent identity of the subscriber and protects the messages exchanged during the Authentication and Key Agreement protocol.

Published in:

Internet Technology and Secured Transactions (ICITST), 2011 International Conference for

Date of Conference:

11-14 Dec. 2011