Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4652
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:04Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:04Z-
dc.date.issued2017-
dc.identifier.citationParne, B. L., Gupta, S., & Chaudhari, N. S. (2017). Efficient and secure modified cocktail-AKA protocol for UMTS network. Paper presented at the International Conference on Computing, Analytics and Security Trends, CAST 2016, 167-172. doi:10.1109/CAST.2016.7914960en_US
dc.identifier.isbn9781509013388-
dc.identifier.otherEID(2-s2.0-85019964569)-
dc.identifier.urihttps://doi.org/10.1109/CAST.2016.7914960-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4652-
dc.description.abstractThe authentication and key agreement (AKA) protocols of Universal Mobile Telecommunication System (UMTS) have been proposed to overcome the weakness observed in the 2nd generation mobile communication system. The UMTS-AKA is susceptible to different attacks as redirection attack, denial of service attack, man in the middle attack, impersonation attack, and identity catching attack. Many protocols were proposed to defeat these type of attack on the UMTS network. Cocktail-AKA is one of the proposed protocol to overcome the existing problem of UMTS-AKA and to avoid the different attacks on it. In this paper, first we show that the cocktail-AKA is vulnerable to redirection attack, denial of service attack and identity catching attack. Later, we propose the possible countermeasure to each identified attack. We modify the cocktail-AKA protocol in such a way that it vanquish all the attacks on it. Finally, we show the qualitative and security analysis of the proposed modified cocktail-AKA protocol with respect to various issues and prevention from different attacks. The qualitative and quantitative analysis show that the proposed protocol has less computation and communication overhead compare to other UMTS-AKA protocol. © 2016 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceInternational Conference on Computing, Analytics and Security Trends, CAST 2016en_US
dc.subjectComputer crimeen_US
dc.subjectDenial-of-service attacken_US
dc.subjectInternet protocolsen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectNetwork securityen_US
dc.subjectRadio broadcastingen_US
dc.subjectAuthentication and key agreementsen_US
dc.subjectCocktail-AKAen_US
dc.subjectCommunication overheadsen_US
dc.subjectImpersonation attacken_US
dc.subjectMan in the middle attacksen_US
dc.subjectQualitative and quantitative analysisen_US
dc.subjectRedirection Attacken_US
dc.subjectUniversal mobile telecommunication systemsen_US
dc.subjectMobile securityen_US
dc.titleEfficient and secure modified cocktail-AKA protocol for UMTS networken_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: