Title: | Strong password authentication with AKA authentication mechanism |
Authors: | Dostálek, Libor Šafařík, Jiří |
Citation: | 2017 International Conference on Applied Electronics: Pilsen, 5th – 6th September 2017, Czech Republic, p.49-54. |
Issue Date: | 2017 |
Publisher: | Západočeská univerzita v Plzni |
Document type: | konferenční příspěvek conferenceObject |
URI: | http://hdl.handle.net/11025/35407 |
ISBN: | 978–80–261–0641–8 (Print) 978–80–261–0642–5 (Online) |
ISSN: | 1803–7232 (Print) 1805–9597 (Online) |
Keywords: | autentizace;AKA;mobilní aplikace;IMS;robustní dvoufaktorové ověřování;mobilní autentizace |
Keywords in different language: | authentication;AKA;mobile application;IMS;robust two-factor authentication;mobile authentication |
Abstract in different language: | This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the future. These applications will be based either on SIP (video on demand etc.) or HTTP-based protocols (e.g. as government applications or banking applications etc.). They will be provided not only by Telco operators, but also especially by independent third parties - application (content) providers (e.g. government, banks etc.). This contribution proposes new authentication algorithms that combine AKA algorithm with other authentication algorithms. Therefore, the authentication is not under the sole control of Telco operators, still using strong authentication AKA protocol. |
Rights: | © Západočeská univerzita v Plzni |
Appears in Collections: | Applied Electronics 2017 Applied Electronics 2017 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Dostalek.pdf | Plný text | 1,1 MB | Adobe PDF | View/Open |
Please use this identifier to cite or link to this item:
http://hdl.handle.net/11025/35407
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.