Efficient and Secure Authentication and Key Agreement Protocol

In the UMTS Authentication and Key Agreement (AKA) protocol only the home network can generate authentication vectors to its subscribers. Therefore; the Home Location Register and Authentication Centre (HLR/AuC) actually suffers from the traffic bottleneck. AKA protocol has been enhanced by generating temporary key to enable Visitor Location Register (VLR/SGSN) to authenticate Mobile Station (MS) without intervention of HLR/AuC. This proposed protocol called Efficient AKA (E-AKA), the proposed protocol satisfies the security requirements of third generation (3G) mobile networks. In this research paper the current AKA has been enhanced by reducing the network traffic, signaling message between entities. This is achieved by reducing a size n array of authentication vector and the number of messages between MS and HLR/AuC.

Provided by: Applied Science University Topic: Security Date Added: Apr 2011 Format: PDF

Find By Topic