Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/5010
Full metadata record
DC FieldValueLanguage
dc.contributor.authorThomas, Jayaen_US
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:28Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:28Z-
dc.date.issued2015-
dc.identifier.citationSaxena, N., Thomas, J., & Chaudhari, N. S. (2015). ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks. Wireless Personal Communications, 84(3), 1981-2012. doi:10.1007/s11277-015-2551-7en_US
dc.identifier.issn0929-6212-
dc.identifier.otherEID(2-s2.0-84941425575)-
dc.identifier.urihttps://doi.org/10.1007/s11277-015-2551-7-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/5010-
dc.description.abstractThe authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXT-AKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA. © 2015, Springer Science+Business Media New York.en_US
dc.language.isoenen_US
dc.publisherKluwer Academic Publishersen_US
dc.sourceWireless Personal Communicationsen_US
dc.subjectAuthenticationen_US
dc.subjectBandwidthen_US
dc.subjectComputer crimeen_US
dc.subjectDenial-of-service attacken_US
dc.subjectDOSen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectHome networksen_US
dc.subjectMobile securityen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectPersonal communication systemsen_US
dc.subjectAuthentication and key agreementsen_US
dc.subjectCommunication overheadsen_US
dc.subjectGlobal system for mobile communications (GSM)en_US
dc.subjectMan in the middleen_US
dc.subjectMan in the middle attacksen_US
dc.subjectRedirectionen_US
dc.subjectUMTSen_US
dc.subjectUniversal mobile telecommunication systemsen_US
dc.subjectNetwork securityen_US
dc.titleES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networksen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: