Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2006

Open Access 01.12.2006 | Research Article

A New Authentication Protocol for UMTS Mobile Networks

verfasst von: Ja'afer Al-Saraireh, Sufian Yousef

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2006

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
download
DOWNLOAD
print
DRUCKEN
insite
SUCHEN
loading …

Abstract

This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
download
DOWNLOAD
print
DRUCKEN
Literatur
1.
Zurück zum Zitat Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.CrossRef Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.CrossRef
2.
Zurück zum Zitat Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005 Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005
3.
Zurück zum Zitat Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130. Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130.
4.
Zurück zum Zitat 3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: General 3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: General
5.
Zurück zum Zitat 3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specification 3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specification
6.
Zurück zum Zitat 3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test data 3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test data
7.
Zurück zum Zitat Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.CrossRef Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.CrossRef
8.
Zurück zum Zitat 3GPP TS 21.133. 3GPP Security; Security Architecture 3GPP TS 21.133. 3GPP Security; Security Architecture
9.
Zurück zum Zitat Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.CrossRef Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.CrossRef
10.
Zurück zum Zitat AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B): AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B):
11.
Zurück zum Zitat AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, Canada AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, Canada
Metadaten
Titel
A New Authentication Protocol for UMTS Mobile Networks
verfasst von
Ja'afer Al-Saraireh
Sufian Yousef
Publikationsdatum
01.12.2006
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/WCN/2006/98107

Weitere Artikel der Ausgabe 1/2006

EURASIP Journal on Wireless Communications and Networking 1/2006 Zur Ausgabe

Premium Partner