Open Access

A New Authentication Protocol for UMTS Mobile Networks

EURASIP Journal on Wireless Communications and Networking20062006:098107

DOI: 10.1155/WCN/2006/98107

Received: 28 November 2005

Accepted: 16 August 2006

Published: 17 August 2006

Abstract

This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.

[1234567891011]

Authors’ Affiliations

(1)
Faculty of Science and Technology, Anglia Ruskin University

References

  1. Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.View ArticleGoogle Scholar
  2. Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005Google Scholar
  3. Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130.Google Scholar
  4. 3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: General
  5. 3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specification
  6. 3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test data
  7. Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.View ArticleGoogle Scholar
  8. 3GPP TS 21.133. 3GPP Security; Security Architecture
  9. Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.View ArticleGoogle Scholar
  10. AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B):
  11. AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, CanadaGoogle Scholar

Copyright

© J. Al-Saraireh and S. Yousef. 2006

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.