SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Khan M, Ahmed A, Cheema AR. Vulnerabilities of UMTS Access Domain Security Architecture. Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Thailand, 2008.
  • 2
    3GPP TS 23.003. 3rd Generation Partnership Project; Technical Specification Group Core Network; Numbering, addressing and identification (Release 1999), 2003.
  • 3
    3GPP TS 133.103. Universal Mobile Telecommunications System (UMTS); 3G Security; Integration Guidelines (3G TS 33.103 version 3.2.0 Release 1999), 2000.
  • 4
    Farhat F, Salimi S, Salimi A. An extended Authentication and Key Agreement Protocol of UMTS. ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience, 2009.
  • 5
    Zhang M, Fang Y. Security analysis and enhancement of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005; 4:2.
  • 6
    Huang YL, Shen CY, Shieh SW. S-AKA: a provable and secure authentication key agreement protocol for UMTS networks. IEEE Transactions on Vehicular Technology 2011; 60:9.
  • 7
    Ou HH, Hwang MS, Jan JK. A cocktail protocol with the authentication and key agreement on the UMTS. Journal of Systems and Software 2010; 3(2):316325.
  • 8
    Wu S, Zhu Y, Pu Q. Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS. IEEE Communications Letters 2010; 14:4.
  • 9
    Huang CM, Li JW. Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA ’05), 2005.
  • 10
    Kim D, Cui Y, Kim S, Oh H. A privacy protecting UMTS AKA protocol providing perfect forward secrecy. Lecture Notes in Computer Science 2007; 4706/2007:987995.
  • 11
    Ou HH, Lin IC, Hwang MS, Jan JK. TK-AKA: using temporary key on authentication and key agreement protocol on UMTS. International Journal of Network Management 2009; 19:291303.
  • 12
    ETSI TS 133.102. Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Security architecture (3GPP TS 33.102 version 11.4.0 Release 11), 2012.
  • 13
    ECRYPT II Network of Excellence. Yearly Report on Algorithms and Keysizes (2009–2010), 2010.
  • 14
    National Institute of Standards and Technology (NIST). Recommendation for Key Management – Part 1: General (Revised). NIST Special Publication, 2006.
  • 15
    Bais A, Penzhorn W, Palencky P. Evaluation of UMTS security architecture and services. IEEE International Conference on Industrial Informatics, Singapore, 2006.
  • 16
    Barkan E, Biham E, Keller E. Instant ciphertext-only cryptanalysis of GSM encrypted communications. Proceedings of Crypto, Advances in Cryptology, 2003.
  • 17
    Meyer U, Wetzel S. On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. Personal, indoor and mobile radio communications 2004; 4:28762883.
  • 18
    Al-Saraireh J, Yousef S, Al Nabhan M. Enhancement Mobile Security and User Confidentiality for UMTS. Second European Conference on Mobile Governement, Brighton, Great Britain, 2006.
  • 19
    Caragata D, El Assad S, Shoniregun CA, Akmayeva G. UMTS Security: Enhancement of Identification, Authentication and Key Agreement Protocols. The 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, December 2011.
  • 20
    3GPP TS 35.206. 3rd Generation Partnership Project; Technical Specifications Group Services and System Aspects; 3G Security; Specifications of the Mileange Algorithm Set: An example algorithm set for the 3GPP Authentication and Key Generation Functions, f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm Specifications.
  • 21
    Xenakis C, Merakos L. Security in third generation mobile networks. Computer Communications 2004; 27:638650.