Please use this identifier to cite or link to this item:
|標題:||TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS||作者:||林詠章
|Project:||International Journal of Network Management||期刊/報告no：:||International Journal of Network Management, Volume 19, Issue 4, Page(s) 291-303.||摘要:||
Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience In recent years, the third-generation cell phone system has approached maturity The Universal Mobile Telecommunication System (UMTS) IS currently the most widely Used System around the world The Third Generation Partnership Project is equipped with the Authentication and Key Agreement (AKA) protocol to maintain secrecy and security both during the authentication process and during the communication session through UMTS However, Hung and Li have pointed out that the UMTS-AKA protocol has three problems, involving bandwidth consumption, space overhead and synchronization of the sequence number which are yet to be resolved In addition, they have proposed an extension of the UMTS-AKA protocol, named the X-AKA protocol, to overcome these obstacles Nevertheless, the X-AKA protocol too appears to have problems of its own In this article, the weaknesses of X-AKA are enumerated In addition, a more practical AKA protocol for UNITS is presented The new protocol, based oil the same framework as its predecessor, proves to be more efficient and practical, satisfying the requirements of modern living Copyright (C) 2008 John Wiley & Sons, Ltd
|Appears in Collections:||財務金融學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.