Teng Fei

College of Engineering

2023 journal article

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

COMPUTER NETWORKS, 228.

By: T. Fei n & W. Wang n

author keywords: Long-term evolution (LTE); Authentication protocol; Analysis and verification
TL;DR: An enhanced AKA protocol is proposed that essentially relies on the asymmetric encryption rather than symmetric in the AKA protocol, and additional digital signatures to countermeasure these attacks and to mitigate the newly found vulnerabilities through formal verification. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 15, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.