EC-AKA2 a revolutionary AKA protocol

Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a mu...

Full description

Saved in:
Bibliographic Details
Published in:2013 International Conference on Computer Applications Technology (ICCAT) pp. 1 - 6
Main Authors: Abdo, J. B., Demerjian, J., Chaouchi, H., Pujolle, G.
Format: Conference Proceeding
Language:English
Published: IEEE 01-01-2013
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a must. Under all these requirements, 3GPP failed to propose a new Authentication and Key Agreement Protocol that solves the vulnerabilities found in the current AKA, and implement user preferences in network selection, thus 3GPP failed to meet LTE's current security needs. This paper proposes a complete AKA protocol that solve four different LTE-AKA weaknesses. The proposed protocol is backward compatible, needs no additional investment and achieves great QoS performance.
ISBN:9781467352840
1467352845
DOI:10.1109/ICCAT.2013.6521993