메뉴 건너뛰기




Volumn 4, Issue 2, 2005, Pages 734-742

Security analysis and enhancements of 3GPP authentication and key agreement protocol

Author keywords

Authentication; Privacy; Security; Third generation (3G); Wireless

Indexed keywords

ALGORITHMS; BANDWIDTH; COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; DATA PRIVACY; OPTIMIZATION; RADIO; SECURITY OF DATA; SYNCHRONIZATION; TELECOMMUNICATION TRAFFIC; VECTORS;

EID: 17144430885     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2004.842941     Document Type: Article
Times cited : (183)

References (22)
  • 1
    • 17144406174 scopus 로고    scopus 로고
    • 3GPP, TS 33.102
    • 3rd Generation Partnership Project; Technical Specification Group SA; 3G Security, "Security Architecture, version 4.2.0, Release 4," 3GPP, TS 33.102, 2001.
    • (2001) Security Architecture, Version 4.2.0, Release 4
  • 4
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • 1st Qtr.
    • A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks," IEEE Personal Commun., vol. 1, no. 1, pp. 25-31, 1st Qtr. 1994.
    • (1994) IEEE Personal Commun. , vol.1 , Issue.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 5
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communication system
    • Aug.
    • M. J. Beller, L.-F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communication system," IEEE J. Sel. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.J.1    Chang, L.-F.2    Yacobi, Y.3
  • 6
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • M. Beller and Y. Yacobi, "Fully-fledged two-way public key authentication and key agreement for low-cost terminals," Electron. Lett., vol. 29, pp. 999-1001, 1993.
    • (1993) Electron. Lett. , vol.29 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 8
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • Lecture Notes in Computer Science
    • C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proc. Australian Conf. Information Security and Privacy (ACISP'98), vol. 1438, Lecture Notes in Computer Science, 1998, pp. 344-355.
    • (1998) Proc. Australian Conf. Information Security and Privacy (ACISP'98) , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 10
    • 0033907037 scopus 로고    scopus 로고
    • "Extensions to an authentication technique proposed for global mobility network
    • Mar.
    • L. Buttyan, C. Gbaguidi, S. Sttmann, and U. Wilhelm, "Extensions to an authentication technique proposed for global mobility network," IEEE Trans. Commun., vol. 48, no. 3, pp. 373-376, Mar. 2000.
    • (2000) IEEE Trans. Commun. , vol.48 , Issue.3 , pp. 373-376
    • Buttyan, L.1    Gbaguidi, C.2    Sttmann, S.3    Wilhelm, U.4
  • 11
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • U. Carlsen, "Optimal privacy and authentication on a portable communications system," Oper. Syst. Rev., vol. 28, pp. 16-23, 1994.
    • (1994) Oper. Syst. Rev. , vol.28 , pp. 16-23
    • Carlsen, U.1
  • 13
    • 0010413844 scopus 로고
    • Modifications to enhance the security of GSM
    • Taipei, Taiwan, R.O.C., May
    • L. Harn and H. Lin, "Modifications to enhance the security of GSM," in Proc. 5th Nat. Conf. Information Security, Taipei, Taiwan, R.O.C., May 1995. pp. 74-76.
    • (1995) Proc. 5th Nat. Conf. Information Security , pp. 74-76
    • Harn, L.1    Lin, H.2
  • 14
    • 0032676481 scopus 로고    scopus 로고
    • Enhanced privacy and authentication for the global system for mobile communications
    • C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for mobile communications," Wireless Networks, vol. 5, pp. 231-243, 1999.
    • (1999) Wireless Networks , vol.5 , pp. 231-243
    • Lee, C.H.1    Hwang, M.S.2    Yang, W.P.3
  • 18
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Mar./Apr.
    • R. Molva, D. Samfat, and G. Tsudik, "Authentication of mobile users," IEEE Network, vol. 8, no. 2, pp. 26-34, Mar./Apr. 1994.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 19
    • 84947922642 scopus 로고    scopus 로고
    • On the design of security protocols for mobile communications
    • Lecture Notes in Computer Science
    • Y. Mu and V. Varadharajan, "On the design of security protocols for mobile communications," in Proc. Australian Conf. Information Security and Privacy (ACISP '96), vol. 1172, Lecture Notes in Computer Science, 1996. pp. 134-145.
    • (1996) Proc. Australian Conf. Information Security and Privacy (ACISP '96) , vol.1172 , pp. 134-145
    • Mu, Y.1    Varadharajan, V.2
  • 20
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • Lecture Notes in Computer Science
    • C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, "On key distribution and authentication in mobile radio networks," in Proc. Advances in Cryptology-Eurocrypt, vol. 765, Lecture Notes in Computer Science, 1993, pp. 461-465.
    • (1993) Proc. Advances in Cryptology-eurocrypt , vol.765 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 21
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • Lecture Notes in Computer Science
    • M. Tatebayashi, N. Matsuzaki, and D. B. J. Newman, "Key distribution protocol for digital mobile communication systems," in Proc. Advances in Cryptology-Crypto '89, vol. 435, Lecture Notes in Computer Science, 1989, pp. 324-334.
    • (1989) Proc. Advances in Cryptology-crypto '89 , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.B.J.3
  • 22
    • 0033605501 scopus 로고    scopus 로고
    • Inter-protocol interleaving attacks on some authentication and key distribution protocols
    • W. Tzeng and C. Hu, "Inter-protocol interleaving attacks on some authentication and key distribution protocols," Inf. Processing Lett., vol. 69, pp. 297-302, 1999.
    • (1999) Inf. Processing Lett. , vol.69 , pp. 297-302
    • Tzeng, W.1    Hu, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.