- Research Article
- Open Access
A New Authentication Protocol for UMTS Mobile Networks
EURASIP Journal on Wireless Communications and Networking volume 2006, Article number: 098107 (2006)
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.
Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.
Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005
Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130.
3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: General
3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specification
3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test data
Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.
3GPP TS 21.133. 3GPP Security; Security Architecture
Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.
AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B):
AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, Canada
About this article
Cite this article
Al-Saraireh, J., Yousef, S. A New Authentication Protocol for UMTS Mobile Networks. J Wireless Com Network 2006, 098107 (2006). https://doi.org/10.1155/WCN/2006/98107
- Setup Time
- Mobile Station
- Mobile Network
- Mobility Model
- Authentication Protocol