메뉴 건너뛰기




Volumn 60, Issue 9, 2011, Pages 4509-4519

S-AKA: A provable and secure authentication key agreement protocol for UMTS networks

Author keywords

Authentication protocol; key agreement protocol; Universal Mobile Telecommunication System (UMTS) networks

Indexed keywords

AUTHENTICATION AND KEY AGREEMENTS; AUTHENTICATION KEY AGREEMENT; AUTHENTICATION PROTOCOLS; BANDWIDTH CONSUMPTION; FORMAL PROOFS; KEY AGREEMENT PROTOCOL; MAN IN THE MIDDLE ATTACKS; MOBILE SUBSCRIBERS; UMTS NETWORKS; UNIVERSAL MOBILE TELECOMMUNICATION SYSTEMS;

EID: 83655165222     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2011.2168247     Document Type: Conference Paper
Times cited : (46)

References (20)
  • 1
    • 4544286919 scopus 로고    scopus 로고
    • Privacy and authentication protocol providing anonymous channels in GSM
    • Nov.
    • A. Peinado, "Privacy and authentication protocol providing anonymous channels in GSM," Comput. Commun., vol. 27, no. 17, pp. 1709-1715, Nov. 2004.
    • (2004) Comput. Commun. , vol.27 , Issue.17 , pp. 1709-1715
    • Peinado, A.1
  • 2
    • 54949140060 scopus 로고    scopus 로고
    • A dynamic authentication scheme for mobile transactions
    • Jan.
    • B. S. Babu and P. Venkataram, "A dynamic authentication scheme for mobile transactions," Int. J. Netw. Secur., vol. 8, no. 1, pp. 59-74, Jan. 2009.
    • (2009) Int. J. Netw. Secur. , vol.8 , Issue.1 , pp. 59-74
    • Babu, B.S.1    Venkataram, P.2
  • 4
    • 11244304396 scopus 로고    scopus 로고
    • A man-in-the-middle attack on UMTS
    • New York
    • U.Meyer and S.Wetzel, "A man-in-the-middle attack on UMTS," in Proc. 3rd ACM WiSe, New York, 2004, pp. 90-97.
    • (2004) Proc. 3rd ACM WiSe , pp. 90-97
    • Meyer, U.1    Wetzel, S.2
  • 5
    • 83655200936 scopus 로고    scopus 로고
    • Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, Third Generation Partnership Project, Tech. Rep. Tech. Spec. 3G TS 33.102 V3.7.0
    • Technical Specification Group Services and System Aspects; 3G Security; Security Architecture, Third Generation Partnership Project, Tech. Rep. Tech. Spec. 3G TS 33.102 V3.7.0, 2000.
    • (2000)
  • 6
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Mar.
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 7
    • 80053096670 scopus 로고    scopus 로고
    • Cryptanalysis of security enhancement for a modified authentication key agreement protocol
    • Jul
    • K.-M. Cheng, T.-Y. Chang, and J.-W. Lo, "Cryptanalysis of security enhancement for a modified authentication key agreement protocol," Int. J. Netw. Secur., vol. 11, no. 1, pp. 55-57, Jul. 2010.
    • (2010) Int. J. Netw. Secur. , vol.11 , Issue.1 , pp. 55-57
    • Cheng, K.-M.1    Chang, T.-Y.2    Lo, J.-W.3
  • 8
    • 83655161144 scopus 로고    scopus 로고
    • Security enhancement for a modified authenticated key agreement protocol
    • C. C. Chang, K. F. Hwang, and I. C. Lin, "Security enhancement for a modified authenticated key agreement protocol," Int. J. Comput. Numer. Anal. Appl., vol. 3, no. 1, pp. 1-7, 2003.
    • (2003) Int. J. Comput. Numer. Anal. Appl. , vol.3 , Issue.1 , pp. 1-7
    • Chang, C.C.1    Hwang, K.F.2    Lin, I.C.3
  • 9
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • Jun.
    • D. Seo and P. Sweeney, "Simple authenticated key agreement algorithm," Electron. Lett., vol. 35, no. 13, pp. 1073-1074, Jun.1999.
    • (1999) Electron. Lett. , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.1    Sweeney, P.2
  • 10
    • 83655200932 scopus 로고    scopus 로고
    • Novel authentication algorithm public key based cryptography in mobile phone systems
    • Feb.
    • S. I. Gy. Gdor, "Novel authentication algorithm public key based cryptography in mobile phone systems," Int. J. Comput. Sci. Netw. Secur., vol. 6, no. 2B, pp. 126-134, Feb. 2006.
    • (2006) Int. J. Comput. Sci. Netw. Secur. , vol.6 , Issue.2 B , pp. 126-134
    • Gdor, S.I.G.1
  • 11
    • 83655166842 scopus 로고    scopus 로고
    • A novel security algorithm for universal mobile telecommunication system
    • Jan
    • J. A. Murtaza Naveed Akhtar and A. Ali Minhas, "A novel security algorithm for universal mobile telecommunication system," Int. J. Multimedia Ubiquitous Eng., vol. 5, no. 1, pp. 1-18, Jan. 2010.
    • (2010) Int. J. Multimedia Ubiquitous Eng. , vol.5 , Issue.1 , pp. 1-18
    • Murtaza Naveed Akhtar, J.A.1    Ali Minhas, A.2
  • 12
    • 20844442672 scopus 로고    scopus 로고
    • One-pass GPRS and IMS authentication procedure for UMTS
    • Jun.
    • Y.-B. Lin, M.-F. Chang, M.-T. Hsu, and L.-Y. Wu, "One-pass GPRS and IMS authentication procedure for UMTS," IEEE J. Sel. Areas Commun., vol. 23, no. 6, pp. 1233-1239, Jun. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.6 , pp. 1233-1239
    • Lin, Y.-B.1    Chang, M.-F.2    Hsu, M.-T.3    Wu, L.-Y.4
  • 14
    • 33744500005 scopus 로고    scopus 로고
    • Authentication and key agreement protocol for UMTS with low bandwidth consumption
    • C.-M. Huang and J.-W. Li, "Authentication and key agreement protocol for UMTS with low bandwidth consumption," in Proc. 19th Int. Conf. AINA, 2005, pp. 392-397.
    • (2005) Proc. 19th Int. Conf. AINA , pp. 392-397
    • Huang, C.-M.1    Li, J.-W.2
  • 15
    • 33751544496 scopus 로고    scopus 로고
    • A new authentication protocol for UMTS mobile networks
    • Apr.
    • J. Al-Saraireh and S. Yousef, "A new authentication protocol for UMTS mobile networks," EURASIP J. Wireless Commun. Netw., vol. 2006, no. 2, p. 19, Apr. 2006.
    • (2006) EURASIP J. Wireless Commun. Netw. , vol.2006 , Issue.2 , pp. 19
    • Al-Saraireh, J.1    Yousef, S.2
  • 16
    • 36348930056 scopus 로고    scopus 로고
    • Nested one-time secret mechanisms for fast mutual authentication in mobile communications
    • E. Chun-I, P.-H. Ho, and H.-Y. Chen, "Nested one-time secret mechanisms for fast mutual authentication in mobile communications," in Proc. IEEE Wireless Commun. Netw. Conf., 2007, pp. 2714-2719.
    • (2007) Proc.IEEE Wireless Commun. Netw. Conf. , pp. 2714-2719
    • Chun-I, E.1    Ho, P.-H.2    Chen, H.-Y.3
  • 17
    • 73149084427 scopus 로고    scopus 로고
    • A cocktail protocol with the authentication and key agreement on the UMTS
    • Feb
    • H.-H. Ou, M.-S. Hwang, and J.-K. Jan, "A cocktail protocol with the authentication and key agreement on the UMTS," J. Syst. Softw., vol. 83, no. 2, pp. 316-325, Feb. 2010.
    • (2010) J. Syst. Softw. , vol.83 , Issue.2 , pp. 316-325
    • Ou, H.-H.1    Hwang, M.-S.2    Jan, J.-K.3
  • 18
    • 77950642661 scopus 로고    scopus 로고
    • Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
    • Apr
    • S.Wu, Y. Zhu, and Q. Pu, "Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS," Commun. Lett., vol. 14, no. 4, pp. 366-368, Apr. 2010.
    • (2010) Commun. Lett. , vol.14 , Issue.4 , pp. 366-368
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 19
    • 0004023090 scopus 로고    scopus 로고
    • IBM Zurich Research Lab, Rüschlikon, Switzerland, Tech. Rep. RZ 3120 (#93166)
    • V. Shoup, "On formal models for secure key exchange," IBM Zurich Research Lab, Rüschlikon, Switzerland, Tech. Rep. RZ 3120 (#93166), 1999.
    • (1999) On Formal Models for Secure Key Exchange
    • Shoup, V.1
  • 20
    • 83655184456 scopus 로고    scopus 로고
    • Adaptive protocol for entity authentication and key agreement in mobile networks
    • M. Zhang, "Adaptive protocol for entity authentication and key agreement in mobile networks," in Proc. ICISC, 2003, pp. 166-183.
    • (2003) Proc. ICISC , pp. 166-183
    • Zhang, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.