Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to redirection attack which allows an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system. Moreover, the International Mobile Subscriber Identity (IMSI) which uniquely identifies a user, is still reveal to the visited network and can still be demanded by an attacker who impersonates a base station, as there is no network authentication in this case, and the non-repudiation services requirement which provide the protection for the subscribers from incorrect bill charging, and the service providers with legal evidence when collecting the bills, are two important points in the non-repudiation requirement. In this paper, a dynamic authentication protocol by integrating the public-key cryptography with the hash-chaining technique is presented to significantly improve the security level as well as to improve the performance.

Authors and Affiliations

Keywords

Related Articles

Internet of Things: Rule Based Event Management

"This research paper focuses on the rule based management of the events generated during function of Internet of things (e.g. Smart Devices). These smart devices generate events during the course of action, and the need...

Autism and Seisures in Children Admitted in a Tertiary Hospital

Autism is associated with epilepsy in early childhood, with evidence suggesting that individuals with both autism and more severecognitive impairment are at higher risk. The frequency of an abnormal electroencephalogram...

Bio prospecting Mokkathotakalli Leaves of Piper Betel L. Cv. Kapoori as a Potential Source of Anti Microbial Agents against selected Bacterial Strains

India is a trove house of an ample variety of medicinal plants. Some species are observed wild, while a number of species have been domesticated by the farmers. India is known to be the richest archive of medicinal plant...

Absolute Polar Duty Cycle Division Multiplexing: A Spectrally Efficient Multiplexing Method

Absolute Polar Duty Cycle Division Multiplexing (AP-DCDM) is a new multiplexing technique, which is based on absolute Polar Return-to-Zero (RZ) duty cycles, that increases the channel count from the conventional multiple...

Design an Automatic Temperature Control System for Smart Electric Fan Using PIC

This paper presents an innovative prototype design of electric fan with smart characteristics. This electric fan uses a microcontroller to produce an automation function. It also has a unique double feature designs, such...

Download PDF file
  • EP ID EP340459
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

(2015). Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography. UNKNOWN, 4(1), -. https://europub.co.uk/articles/-A-340459