Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/5028
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:33Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:33Z-
dc.date.issued2014-
dc.identifier.citationSaxena, N., & Chaudhari, N. S. (2014). Secure-AKA: An efficient AKA protocol for UMTS networks. Wireless Personal Communications, 78(2), 1345-1373. doi:10.1007/s11277-014-1821-0en_US
dc.identifier.issn0929-6212-
dc.identifier.otherEID(2-s2.0-84906780104)-
dc.identifier.urihttps://doi.org/10.1007/s11277-014-1821-0-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/5028-
dc.description.abstractIn this paper, we propose an improved and efficient authentication and key agreement (AKA) protocol named "Secure-AKA" to prevent Universal Mobile Telecommunication System (UMTS) network from various attacks like man-in-the-middle attack, redirection attack, replay attack, active attacks in the corrupted UMTS networks, and especially denial of service attack. This protocol completely eliminates the need of counter synchronization between a mobile station and its home network, and protects the actual identity of each user over the network by generating a temporary identity during the authentication. The Secure-AKA protocol generates minimum communication and computation overheads as compared to UMTS-AKA, S-AKA, AP-AKA, EURASIP-AKA, COCKTAIL-AKA, X-AKA, and EXT-AKA protocols. On an average, Secure-AKA protocol reduces 65 % of the bandwidth consumption during the authentication process in comparison to UMTS-AKA, which is the maximum reduction of bandwidth by any AKA protocol referred in the paper. © 2014 Springer Science+Business Media New York.en_US
dc.language.isoenen_US
dc.publisherKluwer Academic Publishersen_US
dc.sourceWireless Personal Communicationsen_US
dc.subjectAuthenticationen_US
dc.subjectBandwidthen_US
dc.subjectDenial-of-service attacken_US
dc.subjectPersonal communication systemsen_US
dc.subjectAttacksen_US
dc.subjectComputation overheadsen_US
dc.subjectEfficient authenticationen_US
dc.subjectIdentityen_US
dc.subjectMan in the middle attacksen_US
dc.subjectOverheadsen_US
dc.subjectUMTSen_US
dc.subjectUniversal mobile telecommunication systemsen_US
dc.subjectNetwork securityen_US
dc.titleSecure-AKA: An efficient AKA protocol for UMTS networksen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: