TY - GEN
T1 - Enhanced authentication technique for next generation 3GPP networks
AU - Gururaj, H. L.
AU - Sunitha, R.
AU - Ramesh, B.
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/1/23
Y1 - 2014/1/23
N2 - The rapid growth in wireless networking has brought a number of security concerns to the service providers and end users. Security, Authentication, Encryption and Access Control are the vital features that must be presented in any communication network. One of the principal reasons that security is such a significant issue in cellular system because they rely on radio waves to carry communications. These radio waves are not restricted by walls or physical boundaries, but rather they are designed to cover, as large as possible wireless cell. However, because the radio waves are so exposed and available, they can be intercepted or jammed by anyone who is within range. Authentication key agreement protocol is widely used in mutual authentication process, which authenticates mobile user to network and network to mobile user. The existing Authentication key agreement is vulnerable to the security attacks. So it's necessary to improve security of the existing protocol.
AB - The rapid growth in wireless networking has brought a number of security concerns to the service providers and end users. Security, Authentication, Encryption and Access Control are the vital features that must be presented in any communication network. One of the principal reasons that security is such a significant issue in cellular system because they rely on radio waves to carry communications. These radio waves are not restricted by walls or physical boundaries, but rather they are designed to cover, as large as possible wireless cell. However, because the radio waves are so exposed and available, they can be intercepted or jammed by anyone who is within range. Authentication key agreement protocol is widely used in mutual authentication process, which authenticates mobile user to network and network to mobile user. The existing Authentication key agreement is vulnerable to the security attacks. So it's necessary to improve security of the existing protocol.
UR - http://www.scopus.com/inward/record.url?scp=84949922246&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84949922246&partnerID=8YFLogxK
U2 - 10.1109/IC3I.2014.7019621
DO - 10.1109/IC3I.2014.7019621
M3 - Conference contribution
AN - SCOPUS:84949922246
T3 - Proceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014
SP - 1361
EP - 1365
BT - Proceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014
Y2 - 27 November 2014 through 29 November 2014
ER -