Khodor Hamandi, Imad Sarji, A. Chehab, I. Elhajj, A. Kayssi
{"title":"增强隐私和计算效率的HSK-AKA LTE方案","authors":"Khodor Hamandi, Imad Sarji, A. Chehab, I. Elhajj, A. Kayssi","doi":"10.1109/WAINA.2013.133","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new Authentication and Key Agreement (AKA) scheme for the Long Term Evolution(LTE) technology. The scheme addresses mainly the privacy concerns related to the identity of mobile users and aims at protecting such users from malicious Mobile Management Entities (MME). In addition, the constraint of limited energy on mobile network elements is taken into consideration when developing the associated computational procedures. Accordingly, we propose a hybrid scheme that employs both symmetric and asymmetric encryption techniques.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"4 1-2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":"{\"title\":\"Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme\",\"authors\":\"Khodor Hamandi, Imad Sarji, A. Chehab, I. Elhajj, A. Kayssi\",\"doi\":\"10.1109/WAINA.2013.133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new Authentication and Key Agreement (AKA) scheme for the Long Term Evolution(LTE) technology. The scheme addresses mainly the privacy concerns related to the identity of mobile users and aims at protecting such users from malicious Mobile Management Entities (MME). In addition, the constraint of limited energy on mobile network elements is taken into consideration when developing the associated computational procedures. Accordingly, we propose a hybrid scheme that employs both symmetric and asymmetric encryption techniques.\",\"PeriodicalId\":359251,\"journal\":{\"name\":\"2013 27th International Conference on Advanced Information Networking and Applications Workshops\",\"volume\":\"4 1-2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 27th International Conference on Advanced Information Networking and Applications Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAINA.2013.133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2013.133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme
In this paper, we propose a new Authentication and Key Agreement (AKA) scheme for the Long Term Evolution(LTE) technology. The scheme addresses mainly the privacy concerns related to the identity of mobile users and aims at protecting such users from malicious Mobile Management Entities (MME). In addition, the constraint of limited energy on mobile network elements is taken into consideration when developing the associated computational procedures. Accordingly, we propose a hybrid scheme that employs both symmetric and asymmetric encryption techniques.