SPUR: A Secured Protocol for UMTS Registration

نویسندگان

  • Manel Abdelkader
  • Noureddine Boudriga
چکیده

This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the registration procedure. It develops a mechanism for the management of relating security associations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pre-Authentication Schemes for UMTS-WLAN Interworking

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

متن کامل

A Secured Registration Protocol for Mobile IP

The combination of Internet and mobile communication has introduced more security problems than the traditional mobile network such as GSM or CDPD which assumes that the xed network is secured. The environment of Mobile IP is a global scale, administratively heterogeneous , network environment. It is necessary to establish the trust relationship between any pair of the parties | the mobile, the...

متن کامل

An Extended Authentication and Key Agreement Protocol of UMTS

Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...

متن کامل

An effective AKA protocol for UMTS

UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...

متن کامل

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup

Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper, we investigate UMTS AKA and some other proposed schemes. Then, we explore the known weaknesses of the previous frameworks suggested for the UMTS AKA pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004