{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:55:00Z","timestamp":1694638500739},"reference-count":16,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4,1]]},"abstract":"<p>Next Generation Networks (NGN) is the evolution of the telecommunication core. The user has to execute multi-pass Authentication and Key Agreement (AKA) procedures in order to get access to the IP Multimedia Subsystem (IMS). This causes overhead on the AAA server and increases the delay of authenticating the user and that is because of unnecessary and repeated procedures and protocols. This paper presents an enhanced one-pass AKA procedure that eliminates the repeated steps without affecting the security level, in addition it reduces the Denial of Service (DoS) attacks. The presented mechanism has minimal impact on the network infrastructure and functionality and does not require any changes to the existing authentication protocols.<\/p>","DOI":"10.4018\/jghpc.2010040104","type":"journal-article","created":{"date-parts":[[2010,4,30]],"date-time":"2010-04-30T16:23:32Z","timestamp":1272644612000},"page":"37-52","source":"Crossref","is-referenced-by-count":1,"title":["Deep Analysis of Enhanced Authentication for Next Generation Networks"],"prefix":"10.4018","volume":"2","author":[{"given":"Mamdouh","family":"Gouda","sequence":"first","affiliation":[{"name":"Misr University of Science & Technology, Egypt"}]}],"member":"2432","reference":[{"key":"jghpc.2010040104-0","doi-asserted-by":"crossref","unstructured":"Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter Base Protocol, RFC 3588.","DOI":"10.17487\/rfc3588"},{"key":"jghpc.2010040104-1","unstructured":"Crespi, N., & Lavaud, S. (2004). WLAN Access to 3G Multimedia Services, Information and Communication Technologies. Bangkok: ICT."},{"key":"jghpc.2010040104-2","doi-asserted-by":"publisher","DOI":"10.1109\/12.689647"},{"key":"#cr-split#-jghpc.2010040104-3.1","unstructured":"3GPP TS 23.228 -v8.1.0. (2007). Technical Specification Group Services and Systems Aspects"},{"key":"#cr-split#-jghpc.2010040104-3.2","unstructured":"IP Multimedia Subsystem Stage 2, Release 8. Arkko, J., & Haverinen, H. (2006). EAP-AKA Authentication, RFC 4187. Asokan, N., Niemi, V., & Nyberg, K. (2005). Man-in-the-Middle in Tunneled Authentication Protocols. Lecture Notes in Computer Science, 3364, 28-41."},{"key":"jghpc.2010040104-4","unstructured":"3GPP TS 33.203 -v7.6.0. (2006). 3G security; Access security for IP based services, Release 7."},{"key":"jghpc.2010040104-5","unstructured":"3GPP TS 33.234-v7.2.0. (2006). 3G security; WLAN interworking security; System description, Release 7."},{"key":"jghpc.2010040104-6","doi-asserted-by":"crossref","unstructured":"Kaufman, C. (2005). The Internet Key Exchange (IKEv2) Protocol, RFC 4306.","DOI":"10.17487\/rfc4306"},{"key":"jghpc.2010040104-7","doi-asserted-by":"crossref","unstructured":"Kent, S., & Atkinson, R. (1998). IP Encapsulating Security Payload (ESP), RFC 2406.","DOI":"10.17487\/rfc2406"},{"key":"jghpc.2010040104-8","doi-asserted-by":"crossref","unstructured":"Kent, S., & Atkinson, R. (1998). Security Architecture for Internet Protocol, RFC 2401.","DOI":"10.17487\/rfc2401"},{"key":"jghpc.2010040104-9","doi-asserted-by":"crossref","unstructured":"Liang, W., & Wang, W. (2005). On Performance Analysis of Challenge\/Response Based Authentication in Wireless Networks. Computer Networks, 48(2).","DOI":"10.1016\/j.comnet.2004.10.016"},{"key":"jghpc.2010040104-10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.845631"},{"key":"jghpc.2010040104-11","doi-asserted-by":"crossref","unstructured":"Ntantogian, C., & Xenakis, C. (2008). One-pass EAP-AKA Authentication in 3G-WLAN Integrated Networks, Wireless Personal Communications. New York: Springer.","DOI":"10.1109\/PIMRC.2007.4394508"},{"key":"jghpc.2010040104-12","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., et al. (2002). SIP: Session Initiation Protocol, RFC 3261.","DOI":"10.17487\/rfc3261"},{"key":"jghpc.2010040104-13","doi-asserted-by":"crossref","unstructured":"Veltri, L., Salsano, S., & Martiniello, G. (2006). Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP. In Proceedings of the IEEE International Conference on Communications (ICC), Istanbul, Turkey.","DOI":"10.1109\/ICC.2006.255100"},{"key":"jghpc.2010040104-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2003.12.004"}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=43883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:04:11Z","timestamp":1654103051000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jghpc.2010040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,4,1]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jghpc.2010040104","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,1]]}}}