Or, H. H., Hwang, M. S., Jan, J. K. (2010). A cocktail diary with authentication and key agreement on UMTS. Journal of Systems and Software, 83 (2), 316-325. Huang, C.M., Li, J. W. (2005). Key authentication and agreement protocol for low bandwidth UMTS.
In the 19th AINA International Conference (p. 392-397). To illustrate that the proposed protocol is safe, the authors adopted a three-way approach to safety analysis. First, an informal security analysis of the protocol was conducted to demonstrate the protocol`s resistance to various attacks to the protocol. Second, the formal automated audit tool AVISPA was used to verify that the security objectives of mutual authentication and secure key agreement have been achieved. And third, a verifiable security approach has been used to formally prove that there is no polynomatic adversary capable of breaking the security of the system. (1) Upon receipt of the aggregate authentication requirement and the aggregate MAC, i.e. Element 3, the M.M. transmits this request to the HSS at the same time as its service network SN_ID. (2) The HSS receives this aggregated message authentication requirement for the MME group and authenticates the entire MAC aggregate group: (a) HSS verifies the aggregate MAC (see (7)).
b) The HSS uses a random number to calculate a temporary group key and generates an authentication disk that will be used by the MTCD to authenticate the HSS because (c)Next generates HSS for each MTCD in the group, as well as the expected XRES response to the random challenge that the HSS sends to MTCD to enable MTCD authentication via MME. calculation and XRES for all members of the group in the form of a table called the Key Index Group (ICC). The CCI for the group is presented as shown in Table 2. (d) HSS sends CCIs and (from (11) to MME. (2) Ms. receives them from the HSS and stores CCI. It is transmitted to each MTCD in the group. (3) For each MTCD, upon receipt of the authentication challenge, one obtains: (a) MTCDs authenticate the HSS of this challenge by checking the calculation (with (9), (10)). b) Each MTCD in the group also calculates a response to the HSS challenge Group members send their response to the tier 2 element that aggregates the response in the same way as for MAC. The aggregate RES is sent to Tier 3, which regroups the response and sends it in aggregate response to the group. The procedure is the same as the aggregate mac ration. (4) The MME receives the response from the aggregate and performs the authentication as follows: (a) The MME checks whether xor xor ……
b) If the audit is successful, the MTCDs are authenticated in the group. At the end of the authentication phase and the key agreement, the MTCDs generated their own s as a common secret key between each MTCD and the MME.