Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to redirection attack which allows an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system. Moreover, the International Mobile Subscriber Identity (IMSI) which uniquely identifies a user, is still reveal to the visited network and can still be demanded by an attacker who impersonates a base station, as there is no network authentication in this case, and the non-repudiation services requirement which provide the protection for the subscribers from incorrect bill charging, and the service providers with legal evidence when collecting the bills, are two important points in the non-repudiation requirement. In this paper, a dynamic authentication protocol by integrating the public-key cryptography with the hash-chaining technique is presented to significantly improve the security level as well as to improve the performance.
Making of Advanced Ontology Based Search and Standardization Engine using Type Convertor Algorithm
Semantic web service (SWS) is an extension of the web service with an explicit representation of meanings. It promises to increase the level of automation and has ability to integrate and reuse diverse information resour...
Hypolipidemic and Antiatherogenic Effects of Aqueous Extract of Libyan Propolis in Lead Acetate Intoxicated Male Albino Mice
Hyperlipidemia is a major cause of atherosclerosis and atherosclerosis-associated conditions. Coronary artery disease is the epidemic of modern civilization in which dyslipidemia contributes significantly to its pathogen...
Determination of Median Lethal Concentration (LC50) and Behavioral Effects of Chlordecone in the Cichlid fish, Etroplus maculatus
The present study was aimed to investigate the median lethal concentration of chlordecone in the Cichlid fish, Etroplus maculatus and also its behavioral changes on the exposure to the environmental contaminant. Behavior...
Mems Pressure Sensor in Automotive Industry
Mems Pressure Sensor in Automotive Industry
A Novel Security Model For Password Stealing And Password Reuse Attacks
The aim of the project is to design a user authentication protocol named Opass which leverages a user cell phone and short message service to password stealing and password reuse attacks. Opass only requires a unique pho...