AKA: authentication and key agreement security protocol
#1

AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks
Reply
#2

AKA( Authentication and Key Agreement) is a security protocol used in 3G networks. This is also used for one-time password generation mechanism in the process of Digest access authentication. symmetric cryptography is utilized in this system and it is a challenge and response system.
Any communication network must address the problems of Security, Authentication, Encryption and Access Control as the vital features. The radio waves are used to carry communications and as a result, the need for the security is implied. The integrated cryptographic mechanisms for authentication and confidentially was first implemented by the GSM. The weak authentication and encryption algorithms, secret key length of just 32 buts are the major disadvantages the security features of GSM suffered from. The UMTS (Universal Mobile Telecommunication System) was the first third generation mobile communication system and the security features incorporated were such that to cover the loopholes in GSM and other 2g networks. The features include:
-Mutual Authentication, Network to Network security, International Mobile Subscriber identity (IMSI) usage etc.

UMTS AKA Protocol
three components are present in the UMTS that participate in the authentication procedure which are:
-Mobile station (MS) and UMTS Subscriber Identity Module (USIM),
-A VLR(Visitor Location Register), and the Serving Network which the MS
-HN(home network) which also includes the Home Location Register as well as the AuC (authentication centre).

For more details see:
http://en.wikipediawiki/AKA_%28security%29#AKA_in_CDMA
http://gbspublisherijtacs/1009.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: network security key, office key agreement forms, fbi mobility agreement, http digest aka, service level agreement template, extension of aka protocol for umts ppt, loan agreement form,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,877 24-11-2018, 01:19 AM
Last Post:
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,182 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,438 07-08-2014, 11:32 PM
Last Post: [email protected]
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,424 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,111 30-03-2014, 04:40 AM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 10,100 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 12,069 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,841 24-06-2013, 11:44 AM
Last Post: Guest
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,359 02-02-2013, 03:56 PM
Last Post: seminar details
  Network security and protocols project topics 1 2,254 24-01-2013, 12:41 PM
Last Post: seminar details

Forum Jump: