ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Authentication for Mobile Communication using Aka Protocol

Journal: Engineering and Scientific International Journal (Vol.S, No. 1)

Publication Date:

Authors : ;

Page : 1-4

Keywords : Authentication; GSM; AKA protocol; keys;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Mobile communication is widely used by all over the world. Mobile phones are developed by day by day and the security issue are increasing. The using of handset is increasing due to the request of marketing side. In this paper focus on the architecture of GSM and UMTS and Authentication and key agreement (AKA) protocol. While using the encryption algorithm A3, A5, and A8 to solve the problem of transmission process authentication vector in secure manner into a secure manner.

Last modified: 2017-12-24 18:05:41