Achieving Better Privacy for the 3GPP AKA Protocol
نویسندگان
چکیده
منابع مشابه
Achieving Better Privacy for the 3GPP AKA Protocol
Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between clients and associated network servers. As a result AKA must guarantee the indistinguishability from random of the session keys (key-indistinguishability), as well as clientand server-impersonation...
متن کاملA Cryptographic Analysis of the 3GPP AKA Protocol
Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms ca...
متن کاملAn effective AKA protocol for UMTS
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...
متن کاملمروری بر پروتکل احراز اصالت و توافق کلیدEAP-AKA در شبکۀ میانکاری 3GPP-WLAN
پوششدهی مناسب، دسترسپذیری و سرعت بالای انتقال داده از مهمترین مسائل در مخابرات نسل جدید است. بر همین اساس از مخابرات نسل سوم، ارائۀ خدمات میانکاری مطرح شد و در مخابرات نسل چهارم بیشتر مورد توجه قرار گرفت. بر همین اساس فناوریهای متفاوتی برای ارائۀ خدمات میانکاری، در مخابرات نسل جدید مطرح شد که از این بین، فناوری WLAN بیشتر از همه مورد استقبال قرار گرفت. مرجع استانداردسازی 3GPP برای ارا...
متن کاملNS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks
In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2016
ISSN: 2299-0984
DOI: 10.1515/popets-2016-0039