Common Contracts

1 similar null contracts

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
December 20th, 2023
  • Filed
    December 20th, 2023

Long Term Evolution LTE is the first technology that pro- vides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge- response based technique. Therefore, a high secure public key algorithm can be implemented to improve the network security services. As the network operator is often con- sidered as not being a highly trusted party and can thus face threats, the communications ends are the only secure parties to provide such security features. This paper pro- poses a secure mutual authentication and key agreement scheme for LTE cellular system with user-to-user secu- rity. The network side in this scheme operates as a proxy and non-trusted party to provide the security architecture with more flexibility and reliab

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.