EC-AKA2 a revolutionary AKA protocol
Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a mu...
Saved in:
Published in: | 2013 International Conference on Computer Applications Technology (ICCAT) pp. 1 - 6 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-01-2013
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a must. Under all these requirements, 3GPP failed to propose a new Authentication and Key Agreement Protocol that solves the vulnerabilities found in the current AKA, and implement user preferences in network selection, thus 3GPP failed to meet LTE's current security needs. This paper proposes a complete AKA protocol that solve four different LTE-AKA weaknesses. The proposed protocol is backward compatible, needs no additional investment and achieves great QoS performance. |
---|---|
ISBN: | 9781467352840 1467352845 |
DOI: | 10.1109/ICCAT.2013.6521993 |