S-AKA: A provable and secure authentication key agreement protocol for UMTS networks

Yu-Lun Huang*, Chih Ya Shen, Shiuhpyng Shieh

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

40 Scopus citations

Abstract

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS), which is proposed to solve the vulnerabilities found in Global System for Mobile Communications (GSM) systems, is still vulnerable to redirection and man-in-the-middle attacks. An adversary can mount these attacks to eavesdrop or mischarge the subscribers in the system. In this paper, we propose a secure AKA (S-AKA) protocol to cope with these problems. The S-AKA protocol can reduce bandwidth consumption and the number of messages required in authenticating mobile subscribers. We also give the formal proof of the S-AKA protocol to guarantee its robustness.

Original languageEnglish
Article number6025320
Pages (from-to)4509-4519
Number of pages11
JournalIEEE Transactions on Vehicular Technology
Volume60
Issue number9
DOIs
StatePublished - 1 Nov 2011

Keywords

  • Authentication protocol
  • key agreement protocol
  • Universal Mobile Telecommunication System (UMTS) networks

Fingerprint Dive into the research topics of 'S-AKA: A provable and secure authentication key agreement protocol for UMTS networks'. Together they form a unique fingerprint.

Cite this