Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Komninos, N.; Dimitriou, T. (2006)
Languages: English
Types: Unknown
Subjects: QA76
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network. Similarly, in third generation mobile systems [3] a challenge response protocol was chosen in such a way as to achieve maximum compatibility with the current GSM security architecture. Both authentication mechanisms use symmetric key cryptography because of the limited processing power of the mobile devices. However, recent research [6] has shown that asymmetric, or public, key cryptography can be enabled successfully in future mobile terminals. In this paper, we propose a new adaptive authentication and key agreement protocol (AAKA) for future mobile communication systems. The novelty of AAKA and its main advantage over other challenge response protocols is that can be adaptive to the mobile environment and use symmetric and/or public key cryptography for user and network authentication.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] 3GPP TS 21.133, "3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Threats and Requirements", 2004
    • [2] 3GPP TS 33.120, "3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Principles and Objectives", 2004
    • [3] 3GPP TS 33.102, “3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture", 2004
    • [4] ISO/IEC 9798-4, "Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function", 2004
    • [5] ETSI GSM 03.20, “Digital cellular telecommunications systems (Phase 2+); Security related network functions”, 2000
    • [6] N. Komninos and B. Honary, “Novel Methods for Enabling Public Key Schemes in Future Mobile Systems,”In 3rd International Conference on 3G Mobile Communication Technologies, IEE Conference Publication 489, ISBN 0 85296 749 7, UK, 2002, pp. 455-458.
    • [7] H. Haverinen, N. Asokan, and T. Maattanen,“Authentication and key generation for mobile IP using GSM authentication and roaming”IEEE International Conference on Communications, 11-14 June 2001 Page(s):2453 - 2457 vol.8.
    • [8] T. Yuh-Ren and C. Cheng-Ju, “SIM-based subscriber authentication for wireless local area networks”, 37th IEEE International Carnahan Conference on Security Technology, 14-16 Oct. 2003 Page(s):468 - 473.
    • [9] L. Wei and W. Wenye, “A lightweight authentication protocol with local security association control in mobile networks” IEEE Military Communications Conference, 31 Oct.-3 Nov. 2004 Page(s):225 - 231, vol. 1.
    • [10] J. Jong Min, L. Goo Yeon, and L. Yong,“Mutual authentication protocols for the virtual home environment in 3G mobile network”, IEEEGlobal Telecommunications Conference, 17-21 Nov. 2002 Page(s):1658 - 1662, vol.2.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

Share - Bookmark

Download from

Cite this article