Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/5010
Title: ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
Authors: Thomas, Jaya
Chaudhari, Narendra S.
Keywords: Authentication;Bandwidth;Computer crime;Denial-of-service attack;DOS;Global system for mobile communications;Home networks;Mobile security;Mobile telecommunication systems;Personal communication systems;Authentication and key agreements;Communication overheads;Global system for mobile communications (GSM);Man in the middle;Man in the middle attacks;Redirection;UMTS;Universal mobile telecommunication systems;Network security
Issue Date: 2015
Publisher: Kluwer Academic Publishers
Citation: Saxena, N., Thomas, J., & Chaudhari, N. S. (2015). ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks. Wireless Personal Communications, 84(3), 1981-2012. doi:10.1007/s11277-015-2551-7
Abstract: The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXT-AKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA. © 2015, Springer Science+Business Media New York.
URI: https://doi.org/10.1007/s11277-015-2551-7
https://dspace.iiti.ac.in/handle/123456789/5010
ISSN: 0929-6212
Type of Material: Journal Article
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: