Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1
Abstract
The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to redirection attack which allows an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system. Moreover, the International Mobile Subscriber Identity (IMSI) which uniquely identifies a user, is still reveal to the visited network and can still be demanded by an attacker who impersonates a base station, as there is no network authentication in this case, and the non-repudiation services requirement which provide the protection for the subscribers from incorrect bill charging, and the service providers with legal evidence when collecting the bills, are two important points in the non-repudiation requirement. In this paper, a dynamic authentication protocol by integrating the public-key cryptography with the hash-chaining technique is presented to significantly improve the security level as well as to improve the performance.
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Patients
Recently, in many cases, the reason for a patient staying in the hospital is not that he or she actually needs active medical care. Often, the principal reason for a lengthy stay in the hospital is simply continual obser...
The Role of Network Layers in Supporting Knowledge Management Implementations
Knowledge management (KM) approach has been adopted in virtually every business unit in organizations as a means to improve the competitive advantages of organizations. The benefits of KM in maximizing resources and at t...
A Review on Grid and Cloud Computing On Performance Basis
"Cloud computing is pay- as- you- use model which is based on the principle that the end user pays only for the services (such as computer platform, infrastructure and data storage) that are used or reserved by the user....
Using SVM and Stopword removal method in Microblogging Classroom
In recent year, Microblogging is a popular technology in social networking applications. All users publish online short text messages with the help of micro blogging which size less than 200 characters. It can be use via...
Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
Today-s information security threats are increasing in numbers and severity but diversity of network and information technology is increasing exponentially. So it is a challenge for small and medium enterprises, those wh...