An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks

被引:4
作者
Hu Yan-zhi [1 ]
Ma Da-wei [1 ]
Li Xiao-fei [1 ]
机构
[1] Chongqing Commun Inst, Chongqing 400035, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS | 2009年
关键词
authentication; less delay; UMTS; mobile networks;
D O I
10.1109/ICNDS.2009.108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To provide secure communication for universal mobile telecommunications system (UMTS) Mobile Networks, authentication and key agreement (AKA) is carried out between the user and the home environment, and the authentication protocol is an important primitive for entity authentication and session keys. The current authentication protocol is giving a reasonable security level. However it is overloading the network with significant signaling traffic and increasing the call setup time. The signaling load and authentication delay are of particular importance for the efficient authentication. In this paper, we will study and analyze the current authentication protocol, and propose an improved scheme. The proposed protocol only requires a little modification based on the current protocol. It reduces the number of messages and requires less traffic, bandwidth between the user and Visited Location Register (VLR). The more apparent improvement is that the proposed scheme is clearly causing less delay, and it can be better used in UMTS networks.
引用
收藏
页码:111 / 115
页数:5
相关论文
共 8 条
[1]  
*3GPP TS, 2002, 33102V450 3GPP TS
[2]  
*3GPP TS, 2001, 33103V420 3GPP TS
[3]  
*3GPP TS, 2001, 35205V400 3GPP TS
[4]   A new authentication protocol for UMTS mobile networks [J].
Al-Saraireh, Ja'afer ;
Yousef, Sufian .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
[5]   A new authentication protocol for GSM: Networks [J].
Al-Tawil, K ;
Akrami, A ;
Youssef, H .
23RD ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 1998, :21-30
[6]   SIGNALING TRAFFIC VOLUME GENERATED BY MOBILE AND PERSONAL COMMUNICATIONS [J].
POLLINI, GP ;
MEIERHELLSTERN, KS ;
GOODMAN, DJ .
IEEE COMMUNICATIONS MAGAZINE, 1995, 33 (06) :60-65
[7]  
THOMAS R, 1988, P 3 NORD SEM COP DAN
[8]   Security analysis and enhancements of 3GPP authentication and key agreement protocol [J].
Zhang, MX ;
Fang, YG .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (02) :734-742