AKA: authentication and key agreement security protocol
#1

AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks
Reply
#2

AKA( Authentication and Key Agreement) is a security protocol used in 3G networks. This is also used for one-time password generation mechanism in the process of Digest access authentication. symmetric cryptography is utilized in this system and it is a challenge and response system.
Any communication network must address the problems of Security, Authentication, Encryption and Access Control as the vital features. The radio waves are used to carry communications and as a result, the need for the security is implied. The integrated cryptographic mechanisms for authentication and confidentially was first implemented by the GSM. The weak authentication and encryption algorithms, secret key length of just 32 buts are the major disadvantages the security features of GSM suffered from. The UMTS (Universal Mobile Telecommunication System) was the first third generation mobile communication system and the security features incorporated were such that to cover the loopholes in GSM and other 2g networks. The features include:
-Mutual Authentication, Network to Network security, International Mobile Subscriber identity (IMSI) usage etc.

UMTS AKA Protocol
three components are present in the UMTS that participate in the authentication procedure which are:
-Mobile station (MS) and UMTS Subscriber Identity Module (USIM),
-A VLR(Visitor Location Register), and the Serving Network which the MS
-HN(home network) which also includes the Home Location Register as well as the AuC (authentication centre).

For more details see:
http://en.wikipediawiki/AKA_%28security%29#AKA_in_CDMA
http://gbspublisherijtacs/1009.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sample service level agreement, inventory management agreement, aka authentication, consulting agreement, key agreement in ad hoc networks, authentication and key agreement ppt, key word research,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,527 24-11-2018, 01:19 AM
Last Post:
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,162 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,225 07-08-2014, 11:32 PM
Last Post: [email protected]
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,118 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,938 30-03-2014, 04:40 AM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 9,941 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,866 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,640 24-06-2013, 11:44 AM
Last Post: Guest
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,346 02-02-2013, 03:56 PM
Last Post: seminar details
  Network security and protocols project topics 1 2,239 24-01-2013, 12:41 PM
Last Post: seminar details

Forum Jump: