{"title":"改进的自适应认证协议和密钥协议","authors":"N.A. Shalmany, A. Rahbar","doi":"10.1109/ISTEL.2008.4651262","DOIUrl":null,"url":null,"abstract":"We explain the authentication and key agreement protocols for third-generation (3G) wireless communications. This protocol is known as 3GPP-AKA. We show this protocol is vulnerable to false base station attacks, and therefore, it needs synchronization between MS (mobile station) and HN (home network) that increases the complexity of system. Then, we analyze two techniques which are called adaptive protocol for AKA and extension of AKA. Any of these techniques eliminate some of the weaknesses of 3GPP-AKA. We combine these two techniques and propose a new technique, called improved adaptive protocol for AKA (IAP-AKA). We show this technique can be a good successor for 3GPP-AKA by eliminating synchronization, bandwidth wastage, and vulnerability to false base station attacks.","PeriodicalId":133602,"journal":{"name":"2008 International Symposium on Telecommunications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Improved Adaptive Protocol for authentication and key agreement\",\"authors\":\"N.A. Shalmany, A. Rahbar\",\"doi\":\"10.1109/ISTEL.2008.4651262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We explain the authentication and key agreement protocols for third-generation (3G) wireless communications. This protocol is known as 3GPP-AKA. We show this protocol is vulnerable to false base station attacks, and therefore, it needs synchronization between MS (mobile station) and HN (home network) that increases the complexity of system. Then, we analyze two techniques which are called adaptive protocol for AKA and extension of AKA. Any of these techniques eliminate some of the weaknesses of 3GPP-AKA. We combine these two techniques and propose a new technique, called improved adaptive protocol for AKA (IAP-AKA). We show this technique can be a good successor for 3GPP-AKA by eliminating synchronization, bandwidth wastage, and vulnerability to false base station attacks.\",\"PeriodicalId\":133602,\"journal\":{\"name\":\"2008 International Symposium on Telecommunications\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTEL.2008.4651262\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTEL.2008.4651262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved Adaptive Protocol for authentication and key agreement
We explain the authentication and key agreement protocols for third-generation (3G) wireless communications. This protocol is known as 3GPP-AKA. We show this protocol is vulnerable to false base station attacks, and therefore, it needs synchronization between MS (mobile station) and HN (home network) that increases the complexity of system. Then, we analyze two techniques which are called adaptive protocol for AKA and extension of AKA. Any of these techniques eliminate some of the weaknesses of 3GPP-AKA. We combine these two techniques and propose a new technique, called improved adaptive protocol for AKA (IAP-AKA). We show this technique can be a good successor for 3GPP-AKA by eliminating synchronization, bandwidth wastage, and vulnerability to false base station attacks.