The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks.
Teng FeiWenye WangPublished in: Comput. Networks (2023)
Keyphrases
- mobile nodes
- delay tolerant
- mobile networks
- wireless medium
- network protocols
- authentication protocol
- mobile phone
- lightweight
- mobile users
- cellular networks
- social networks
- key distribution
- security analysis
- internet access
- mobile devices
- multimedia services
- mobile computing
- user authentication
- cryptographic protocols
- internet protocol
- access network
- quality of service
- sensor networks
- radio access
- mobile terminals
- wireless technologies
- mobile applications
- mobility management
- smart card
- key agreement