Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1

Abstract

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS) is still vulnerable to redirection attack which allows an adversary to redirect user traffic form a network to another and eavesdrop or mischarge the subscribers in the system. Moreover, the International Mobile Subscriber Identity (IMSI) which uniquely identifies a user, is still reveal to the visited network and can still be demanded by an attacker who impersonates a base station, as there is no network authentication in this case, and the non-repudiation services requirement which provide the protection for the subscribers from incorrect bill charging, and the service providers with legal evidence when collecting the bills, are two important points in the non-repudiation requirement. In this paper, a dynamic authentication protocol by integrating the public-key cryptography with the hash-chaining technique is presented to significantly improve the security level as well as to improve the performance.

Authors and Affiliations

Keywords

Related Articles

Empirical Analysis of Exchange Rate Volatility and Nigeria Stock Market Performance

Since 1993 Nigeria exchange rate started running beyond digit level as against United-state dollar amidst pursuance of growth of macroeconomic indicators. While available data show that growth in key macroeconomic indica...

A Study to Determine the Prevalence of Postnatal Depression Among Primigravida Mothers in Krishna Hospital Karad

"Abstract: Postnatal period is the period when the women readjusting physiologically and psychologically to motherhood. Emotional responses may be just as intense and powerful for experienced as well as for new mothers....

Factors Affecting E-Procurement Adoption in Minimizing Risks in the Supply Chain: A Survey of State Corporations in Kenya

This paper examines the optimization of purchasing through the use of Internet based systems (electronic Procurement). The focus of this paper is the impact of these systems on the supply chain structure and how they are...

Evaluation of Adsorptive Capacity of Bioadsorbent in Removal of Congo Red from Aqueous Solution

Adsorption techniques are widely used to remove certain classes of pollutants from waters, especially those which are not easily biodegradable. Currently a combination of biological treatment and adsorption on activated...

Factors Influencing Implementation of Strategic Plans in Public Secondary Schools in Lari District, Kiambu County

Previous studies have indicated that good strategies have been written but very little has been achieved in their implementation. It has further been argued that only 10% of formulated strategies are successfully implem...

Download PDF file
  • EP ID EP340459
  • DOI -
  • Views 50
  • Downloads 0

How To Cite

(2015). Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography. International Journal of Science and Research (IJSR), 4(1), -. https://europub.co.uk/articles/-A-340459