Strong password authentication with AKA authentication mechanism

Abstract

This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the future. These applications will be based either on SIP (video on demand etc.) or HTTP-based protocols (e.g. as government applications or banking applications etc.). They will be provided not only by Telco operators, but also especially by independent third parties - application (content) providers (e.g. government, banks etc.). This contribution proposes new authentication algorithms that combine AKA algorithm with other authentication algorithms. Therefore, the authentication is not under the sole control of Telco operators, still using strong authentication AKA protocol

Similar works

This paper was published in DSpace at University of West Bohemia.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.