Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/5010
Title: | ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks |
Authors: | Thomas, Jaya Chaudhari, Narendra S. |
Keywords: | Authentication;Bandwidth;Computer crime;Denial-of-service attack;DOS;Global system for mobile communications;Home networks;Mobile security;Mobile telecommunication systems;Personal communication systems;Authentication and key agreements;Communication overheads;Global system for mobile communications (GSM);Man in the middle;Man in the middle attacks;Redirection;UMTS;Universal mobile telecommunication systems;Network security |
Issue Date: | 2015 |
Publisher: | Kluwer Academic Publishers |
Citation: | Saxena, N., Thomas, J., & Chaudhari, N. S. (2015). ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks. Wireless Personal Communications, 84(3), 1981-2012. doi:10.1007/s11277-015-2551-7 |
Abstract: | The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXT-AKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA. © 2015, Springer Science+Business Media New York. |
URI: | https://doi.org/10.1007/s11277-015-2551-7 https://dspace.iiti.ac.in/handle/123456789/5010 |
ISSN: | 0929-6212 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: