AKA: authentication and key agreement security protocol
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
13-08-2009, 05:06 PM

AKA: AKA stands for the authentication and key agreement security protocol. it is a mechanism which performs authentication and session key distribution in universal mobile telecommunications system (umts) networks
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
science projects buddy
Active In SP

Posts: 278
Joined: Dec 2010
25-12-2010, 09:10 PM

AKA( Authentication and Key Agreement) is a security protocol used in 3G networks. This is also used for one-time password generation mechanism in the process of Digest access authentication. symmetric cryptography is utilized in this system and it is a challenge and response system.
Any communication network must address the problems of Security, Authentication, Encryption and Access Control as the vital features. The radio waves are used to carry communications and as a result, the need for the security is implied. The integrated cryptographic mechanisms for authentication and confidentially was first implemented by the GSM. The weak authentication and encryption algorithms, secret key length of just 32 buts are the major disadvantages the security features of GSM suffered from. The UMTS (Universal Mobile Telecommunication System) was the first third generation mobile communication system and the security features incorporated were such that to cover the loopholes in GSM and other 2g networks. The features include:
-Mutual Authentication, Network to Network security, International Mobile Subscriber identity (IMSI) usage etc.

UMTS AKA Protocol
three components are present in the UMTS that participate in the authentication procedure which are:
-Mobile station (MS) and UMTS Subscriber Identity Module (USIM),
-A VLR(Visitor Location Register), and the Serving Network which the MS
-HN(home network) which also includes the Home Location Register as well as the AuC (authentication centre).

For more details see:
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: aka protocol, authentication aka, authentication and key agreement security protocol, authentication and key agreement disadvantage, gsm alarm system 1009 2010 09 10, aka authentication credentials, ppt for secure key agreement and authetixation protocol,
Popular Searches: security agreement, security in online authentication ppt, authentication key distribution key agreement ppt, clause 49 of listing agreement revised, sample service level agreement, authentication and key agreement aka ppt, data flow diagram for group key agreement protocol,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 148 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,413 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 268 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 275 17-01-2015, 04:13 PM
Last Post: jaseelati
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,194 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,011 28-10-2013, 10:56 AM
Last Post: purplepearls
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 18 9,864 08-10-2013, 09:07 PM
Last Post: Guest
  Controlled Data Hiding Technique for Color Image Authentication in Frequency pdf seminar projects maker 0 469 26-09-2013, 03:02 PM
Last Post: seminar projects maker
  Improving ATM Security via Facial Recognition PPT seminar projects maker 0 525 25-09-2013, 02:30 PM
Last Post: seminar projects maker