Evaluation of Security Attacks on UMTS Authentication Mechanism

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks on Port Knocking Authentication Mechanism

Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before they can be widely used. In this paper, we analyze some weaknesses of the port knocking authentication method that makes it vulnerable to many attacks. We will present the NAT-Knocking attack, in which an unauthorized used can...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Security and Authentication Concepts for UMTS/WLAN Convergence

For a fast return of investment, network providers have to offer new services for the upcoming 3G mobile communication systems. Unfortunately 3G systems suffer by high installation costs and low quality of services in terms of high delays and low bandwidth. These drawbacks exclude many promising services such as real–time video conferences and multi– player gaming. Furthermore, high network ins...

متن کامل

On the security of an enhanced UMTS authentication and key agreement protocol

In this paper, we propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, “home network should be partially trusted in an authentication scheme” to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ”subscriber identity/location confidential” ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Security & Its Applications

سال: 2012

ISSN: 0975-2307

DOI: 10.5121/ijnsa.2012.4403