Skip to content


  • Research Article
  • Open Access

A New Authentication Protocol for UMTS Mobile Networks

EURASIP Journal on Wireless Communications and Networking20062006:098107

  • Received: 28 November 2005
  • Accepted: 16 August 2006
  • Published:


This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.


  • Setup Time
  • Mobile Station
  • Mobile Network
  • Mobility Model
  • Authentication Protocol


Authors’ Affiliations

Faculty of Science and Technology, Anglia Ruskin University, Bishop Hall Lane, Chelmsford, CM1 1SQ, UK


  1. Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.View ArticleGoogle Scholar
  2. Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005Google Scholar
  3. Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130.Google Scholar
  4. 3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: GeneralGoogle Scholar
  5. 3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specificationGoogle Scholar
  6. 3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test dataGoogle Scholar
  7. Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.View ArticleGoogle Scholar
  8. 3GPP TS 21.133. 3GPP Security; Security ArchitectureGoogle Scholar
  9. Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.View ArticleGoogle Scholar
  10. AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B):Google Scholar
  11. AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, CanadaGoogle Scholar


© J. Al-Saraireh and S. Yousef. 2006

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.