Common Contracts

2 similar User-to-User Mutual Authentication and Key Agreement Scheme contracts

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
User-to-User Mutual Authentication and Key Agreement Scheme • December 20th, 2023

Long Term Evolution LTE is the first technology that pro- vides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge- response based technique. Therefore, a high secure public key algorithm can be implemented to improve the network security services. As the network operator is often con- sidered as not being a highly trusted party and can thus face threats, the communications ends are the only secure parties to provide such security features. This paper pro- poses a secure mutual authentication and key agreement scheme for LTE cellular system with user-to-user secu- rity. The network side in this scheme operates as a proxy and non-trusted party to provide the security architecture with more flexibility and reliab

AutoNDA by SimpleDocs
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
User-to-User Mutual Authentication and Key Agreement Scheme • October 9th, 2015

Long Term Evolution LTE is the first technology that pro- vides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge- response based technique. Therefore, a high secure public key algorithm can be implemented to improve the network security services. As the network operator is often con- sidered as not being a highly trusted party and can thus face threats, the communications ends are the only secure parties to provide such security features. This paper pro- poses a secure mutual authentication and key agreement scheme for LTE cellular system with user-to-user secu- rity. The network side in this scheme operates as a proxy and non-trusted party to provide the security architecture with more flexibility and reliab

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!