Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/5028
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaudhari, Narendra S. | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:36:33Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:36:33Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Saxena, N., & Chaudhari, N. S. (2014). Secure-AKA: An efficient AKA protocol for UMTS networks. Wireless Personal Communications, 78(2), 1345-1373. doi:10.1007/s11277-014-1821-0 | en_US |
dc.identifier.issn | 0929-6212 | - |
dc.identifier.other | EID(2-s2.0-84906780104) | - |
dc.identifier.uri | https://doi.org/10.1007/s11277-014-1821-0 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/5028 | - |
dc.description.abstract | In this paper, we propose an improved and efficient authentication and key agreement (AKA) protocol named "Secure-AKA" to prevent Universal Mobile Telecommunication System (UMTS) network from various attacks like man-in-the-middle attack, redirection attack, replay attack, active attacks in the corrupted UMTS networks, and especially denial of service attack. This protocol completely eliminates the need of counter synchronization between a mobile station and its home network, and protects the actual identity of each user over the network by generating a temporary identity during the authentication. The Secure-AKA protocol generates minimum communication and computation overheads as compared to UMTS-AKA, S-AKA, AP-AKA, EURASIP-AKA, COCKTAIL-AKA, X-AKA, and EXT-AKA protocols. On an average, Secure-AKA protocol reduces 65 % of the bandwidth consumption during the authentication process in comparison to UMTS-AKA, which is the maximum reduction of bandwidth by any AKA protocol referred in the paper. © 2014 Springer Science+Business Media New York. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Kluwer Academic Publishers | en_US |
dc.source | Wireless Personal Communications | en_US |
dc.subject | Authentication | en_US |
dc.subject | Bandwidth | en_US |
dc.subject | Denial-of-service attack | en_US |
dc.subject | Personal communication systems | en_US |
dc.subject | Attacks | en_US |
dc.subject | Computation overheads | en_US |
dc.subject | Efficient authentication | en_US |
dc.subject | Identity | en_US |
dc.subject | Man in the middle attacks | en_US |
dc.subject | Overheads | en_US |
dc.subject | UMTS | en_US |
dc.subject | Universal mobile telecommunication systems | en_US |
dc.subject | Network security | en_US |
dc.title | Secure-AKA: An efficient AKA protocol for UMTS networks | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: