Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4620
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:59Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:59Z-
dc.date.issued2018-
dc.identifier.citationParne, B. L., Gupta, S., & Chaudhari, N. S. (2018). PASE-AKA: Performance and security enhanced AKA protocol for UMTS network. Paper presented at the 2017 14th IEEE India Council International Conference, INDICON 2017, doi:10.1109/INDICON.2017.8487956en_US
dc.identifier.isbn9781538643181-
dc.identifier.otherEID(2-s2.0-85056406225)-
dc.identifier.urihttps://doi.org/10.1109/INDICON.2017.8487956-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4620-
dc.description.abstractThe Universal Mobile Telecommunication System Authentication and Key Agreement (UMTS-AKA) protocol of 3rd generation mobile communication network is susceptible to various attacks such as redirection, Denial of Service (DoS), Man in-the Middle (MitM) and replay attack. Also, the protocol has several security limitations including the transmission of user identity in the plaintext over the communication channel, synchronization between communication entities and high bandwidth consumption. Many AKA protocols were proposed by the researchers to defeat these problems of the UMTS network. However, these protocols fulfill the security requirements such as mutual authentication, integrity and confidentiality. But, none of them succeed to defeat the single key problem in the communication network. In this article, we propose the performance and security enhanced (PASE-AKA) protocol for UMTS network. The proposed protocol solves the problem of single key during the authentication process and avoids all the identified attacks on the communication network. The formal security analysis of the proposed protocol is carried out by Automated Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves the security goals and secure against various known attacks. Finally, the quantitative analysis of the PASE-AKA shows that the protocol provides the improved security compared to existing UMTS-AKA protocols with acceptable communication and computation overhead. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.source2017 14th IEEE India Council International Conference, INDICON 2017en_US
dc.subjectAuthenticationen_US
dc.subjectDenial-of-service attacken_US
dc.subjectInternet protocolsen_US
dc.subjectMobile securityen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectNetwork protocolsen_US
dc.subjectAuthentication and key agreementsen_US
dc.subjectFormal security analysisen_US
dc.subjectKey Secrecyen_US
dc.subjectMan in the middles (MITM)en_US
dc.subjectMobile communication networksen_US
dc.subjectPASE-AKAen_US
dc.subjectPrivacy preservationen_US
dc.subjectUniversal mobile telecommunication systemsen_US
dc.subjectNetwork securityen_US
dc.titlePASE-AKA: Performance and Security Enhanced AKA Protocol for UMTS Networken_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: