Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
AKA: authentication and key agreement security protocol
Post: #1

AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks
Post: #2
AKA( Authentication and Key Agreement) is a security protocol used in 3G networks. This is also used for one-time password generation mechanism in the process of Digest access authentication. symmetric cryptography is utilized in this system and it is a challenge and response system.
Any communication network must address the problems of Security, Authentication, Encryption and Access Control as the vital features. The radio waves are used to carry communications and as a result, the need for the security is implied. The integrated cryptographic mechanisms for authentication and confidentially was first implemented by the GSM. The weak authentication and encryption algorithms, secret key length of just 32 buts are the major disadvantages the security features of GSM suffered from. The UMTS (Universal Mobile Telecommunication System) was the first third generation mobile communication system and the security features incorporated were such that to cover the loopholes in GSM and other 2g networks. The features include:
-Mutual Authentication, Network to Network security, International Mobile Subscriber identity (IMSI) usage etc.

UMTS AKA Protocol
three components are present in the UMTS that participate in the authentication procedure which are:
-Mobile station (MS) and UMTS Subscriber Identity Module (USIM),
-A VLR(Visitor Location Register), and the Serving Network which the MS
-HN(home network) which also includes the Home Location Register as well as the AuC (authentication centre).

For more details see:

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: data security agreement, rental lease agreement, future use of biomettric technology for security and authentication, the key teachings, system interface agreement, ad agency agreement**ab in aerospace ppt, ppt a gen2 authentication protocol for security and privacy,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 2,100 31-10-2015 02:16 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 17,228 07-08-2014 11:32 PM
Last Post: [email protected]
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 67,058 03-04-2014 11:39 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 6,688 30-03-2014 04:40 AM
Last Post: Guest
  Security in Data Warehousing seminar surveyer 3 2,364 12-08-2013 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 4,024 27-07-2013 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 5,484 24-06-2013 11:44 AM
Last Post: Guest
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 9,174 02-02-2013 03:56 PM
Last Post: seminar details
  network security seminar report computer science technology 13 10,543 24-01-2013 12:42 PM
Last Post: seminar details
  Network security and protocols project topics 1 1,356 24-01-2013 12:41 PM
Last Post: seminar details