Skip to main content

A New Authentication Protocol for UMTS Mobile Networks


This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS) mobile networks, where a new protocol is proposed. In our proposed protocol, the mobile station is responsible for generating of authentication token (AUTN) and random number (RAND). The home location register is responsible for comparison of response and expected response to take a decision. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time, and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database, such as home location register (HLR) and visitor location register (VLR) for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore, the performance and the authentication delay time have been improved significantly.



  1. 1.

    Salgarelli L, Buddhikot M, Garay J, Patel S, Miller S: Efficient authentication and key distribution in wireless IP networks. IEEE Personal Communication on Wireless Communication 2003,10(6):52-61.

    Article  Google Scholar 

  2. 2.

    Calhoun PR, Loughney J, Guttman E, Zorn G, Arkko J: Diameter Base Protocol. April 2005

    Google Scholar 

  3. 3.

    Putz S, Schmitz R, Tonsing F: Authentication schemes for third generation mobile radio systems. Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, September 1998, Boston, Mass, USA 1: 126-130.

    Google Scholar 

  4. 4.

    3GPP TS 35.205. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 1: General

  5. 5.

    3GPP TS 35.206. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 2: Algorithm specification

  6. 6.

    3GPP TS 35.207. 3GPP Security; Specification of the MILENAGE Algorithm Set; Document 3: Implementors test data

  7. 7.

    Zhang M, Fang Y: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 2005,4(2):734-742.

    Article  Google Scholar 

  8. 8.

    3GPP TS 21.133. 3GPP Security; Security Architecture

  9. 9.

    Al-Saraireh J, Yousef S, Al Nabhan M: Analysis and enhancement of authentication algorithms in mobile networks. Journal of Applied Sciences 2006,6(4):872-877.

    Article  Google Scholar 

  10. 10.

    AL-Saraireh J, Yousef S: Authentication transmission overhead between entities in mobile networks. International Journal of Computer Science and Network Security 2006.,6(3B):

  11. 11.

    AL-Saraireh J, Yousef S: A new authentication protocol for GSM and UMT networks. Proceedings of the 17th IASTED International Conference on Modeling and Simulation (MS '06), May 2006, Montreal, Canada

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Ja'afer Al-Saraireh.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Al-Saraireh, J., Yousef, S. A New Authentication Protocol for UMTS Mobile Networks. J Wireless Com Network 2006, 098107 (2006).

Download citation


  • Setup Time
  • Mobile Station
  • Mobile Network
  • Mobility Model
  • Authentication Protocol