Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/15037
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSuvidha K.S.
dc.contributor.authorKamath S.S.
dc.date.accessioned2021-05-05T10:16:16Z-
dc.date.available2021-05-05T10:16:16Z-
dc.date.issued2020
dc.identifier.citationProceedings of the 2020 International Conference on Computing, Communication and Security, ICCCS 2020 , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/ICCCS49678.2020.9277187
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/15037-
dc.description.abstractUser authentication is one of the crucial challenges that has to be addressed in UMTS (Universal Mobile Telecommunications Service) in order to grant the access to the services during handovers. Therefore, to provide the authentication the proposed protocol makes use of the existing Extensible Authentication Protocol (EAP). To provide the authentication in the LTE networks, an authentication framework EAP is used. EAPAKA is one of the methods of EAP framework. EAP-AKA, uses the mechanism Authentication and Key Agreement (AKA). EAPAKA is used in UMTS networks to secure the communication channel. In LTE, this mechanism is called as Evolved Packet System Authentication and Key Agreement (EPS-AKA). Mobile users in LTE networks access the packet data network through Evolved UMTS Terrestrial Radio Access Network (EUTRAN). However, with the thorough literature survey, it is proved that EPS-AKA mechanism is susceptible to the security vulnerabilities such as disclosure of the user identity, Man in the Middle attack and replay attacks. To overcome these security attacks, a new Secure Evolved Packet System (SEPS) protocol has been proposed. The formal security verification of the proposed SEPS protocol using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool is presented in this paper. In addition to this, the proposed protocol is compared with the other protocols in terms of performance. The proposed SEPS protocol is efficient and robust. This makes the proposed protocol suitable for the practical implementation. © 2020 IEEE.en_US
dc.titleSecure 4G SEPS-AKA Protocol for UMTS Networksen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.