SPUR: A Secured Protocol for UMTS Registration
نویسندگان
چکیده
This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the registration procedure. It develops a mechanism for the management of relating security associations.
منابع مشابه
Pre-Authentication Schemes for UMTS-WLAN Interworking
Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...
متن کاملA Secured Registration Protocol for Mobile IP
The combination of Internet and mobile communication has introduced more security problems than the traditional mobile network such as GSM or CDPD which assumes that the xed network is secured. The environment of Mobile IP is a global scale, administratively heterogeneous , network environment. It is necessary to establish the trust relationship between any pair of the parties | the mobile, the...
متن کاملAn Extended Authentication and Key Agreement Protocol of UMTS
Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...
متن کاملAn effective AKA protocol for UMTS
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...
متن کاملPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper, we investigate UMTS AKA and some other proposed schemes. Then, we explore the known weaknesses of the previous frameworks suggested for the UMTS AKA pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004