Authentication for Mobile Communication using Aka Protocol
Journal: Engineering and Scientific International Journal (Vol.S, No. 1)Publication Date: 2015-05-20
Authors : A.Kirthika S.Karpagavalli;
Page : 1-4
Keywords : Authentication; GSM; AKA protocol; keys;
Abstract
Mobile communication is widely used by all over the world. Mobile phones are developed by day by day and the security issue are increasing. The using of handset is increasing due to the request of marketing side. In this paper focus on the architecture of GSM and UMTS and Authentication and key agreement (AKA) protocol. While using the encryption algorithm A3, A5, and A8 to solve the problem of transmission process authentication vector in secure manner into a secure manner.
Other Latest Articles
- A Study on Per Capita Income and Expenditure of STs in Jawadhu Hills, Tiruvannamalai District - Tamil Nadu
- A Study on Household Income and Expenditure of Scheduled Tribe
- Personality Development for Business Entrepreneurship
- Effects of Yogic Practices with and without Diet Modification on Selected Physical and Physiological Variables among Pregnant Women
- A Study on Customer Perception towards Internet Banking
Last modified: 2017-12-24 18:05:41