Enhanced authentication technique for next generation 3GPP networks

H. L. Gururaj, R. Sunitha, B. Ramesh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The rapid growth in wireless networking has brought a number of security concerns to the service providers and end users. Security, Authentication, Encryption and Access Control are the vital features that must be presented in any communication network. One of the principal reasons that security is such a significant issue in cellular system because they rely on radio waves to carry communications. These radio waves are not restricted by walls or physical boundaries, but rather they are designed to cover, as large as possible wireless cell. However, because the radio waves are so exposed and available, they can be intercepted or jammed by anyone who is within range. Authentication key agreement protocol is widely used in mutual authentication process, which authenticates mobile user to network and network to mobile user. The existing Authentication key agreement is vulnerable to the security attacks. So it's necessary to improve security of the existing protocol.

Original languageEnglish
Title of host publicationProceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1361-1365
Number of pages5
ISBN (Electronic)9781479966295
DOIs
Publication statusPublished - 23-01-2014
Event2014 International Conference on Contemporary Computing and Informatics, IC3I 2014 - Mysuru, India
Duration: 27-11-201429-11-2014

Publication series

NameProceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014

Conference

Conference2014 International Conference on Contemporary Computing and Informatics, IC3I 2014
Country/TerritoryIndia
CityMysuru
Period27-11-1429-11-14

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Enhanced authentication technique for next generation 3GPP networks'. Together they form a unique fingerprint.

Cite this