{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:11:44Z","timestamp":1718665904318},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transcom.2016ebp3267","type":"journal-article","created":{"date-parts":[[2016,11,20]],"date-time":"2016-11-20T22:06:59Z","timestamp":1479679619000},"page":"738-748","source":"Crossref","is-referenced-by-count":3,"title":["Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key"],"prefix":"10.23919","volume":"E100.B","author":[{"given":"Fawad","family":"AHMAD","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, City University of Hong Kong"}]},{"given":"Marnel","family":"PERADILLA","sequence":"additional","affiliation":[{"name":"College of Computer Studies, De La Salle University in Manila"}]},{"given":"Akanksha","family":"SAINI","sequence":"additional","affiliation":[{"name":"School of Information, Communications and Electronics Engineering, The Catholic University of Korea"}]},{"given":"Younchan","family":"JUNG","sequence":"additional","affiliation":[{"name":"School of Information, Communications and Electronics Engineering, The Catholic University of Korea"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] E. Dahlman, S. Parkvall, and J. Peisa, \u201c5G wireless access,\u201d IEICE Trans. Commun., vol.E98-B, no.8, pp.1407-1414, Aug. 2015.","DOI":"10.1587\/transcom.E98.B.1407"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, \u201cA survey on security aspects for lte and lte-a networks,\u201d IEEE Commun. Surv. Tutorials, vol.16, no.1, pp.283-302, First 2014.","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Tang and D. Wu, \u201cAn efficient mobile authentication scheme for wireless networks,\u201d IEEE Trans. Wireless Commun., vol.7, no.4, pp.1408-1416, April 2008.","DOI":"10.1109\/TWC.2008.061080"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Zhang and Y. Fang, \u201cSecurity analysis and enhancements of 3GPP authentication and key agreement protocol,\u201d IEEE Trans. Wireless Commun., vol.4, no.2, pp.734-742, March 2005.","DOI":"10.1109\/TWC.2004.842941"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] F.Y. Leu, I. You, Y.L. Huang, K. Yim, and C.R. Dai, \u201cImproving security level of lte authentication and key agreement procedure,\u201d Globecom Workshops (GC Wkshps), 2012 IEEE, pp.1032-1036, Dec. 2012.","DOI":"10.1109\/GLOCOMW.2012.6477719"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] C. Lai, H. Li, R. Lu, and X.S. Shen, \u201cSE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,\u201d Computer Networks, vol.57, no.17, pp.3492-3510, 2013.","DOI":"10.1016\/j.comnet.2013.08.003"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C. Tang, D.A. Naumann, and S. Wetzel, \u201cAnalysis of authentication and key establishment in inter-generational mobile telephony,\u201d High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on, pp.1605-1614, IEEE, 2013.","DOI":"10.1109\/HPCC.and.EUC.2013.226"},{"key":"8","unstructured":"[8] D. Zhang, R. Zhang, X. Niu, Y. Yang, and Z. Zhang, \u201cA new authentication and key agreement protocol of 3G based on diffie-hellman algorithm,\u201d Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, pp.V2-110-V2-113, April 2010."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] M. Purkhiabani and A. Salahi, \u201cEnhanced authentication and key agreement procedure of next generation 3GPP mobile networks,\u201d Int. J. Inf. Electron. Eng., vol.2, no.1, pp.69-77, 2012.","DOI":"10.7763\/IJIEE.2012.V2.57"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] K.A. Alezabi, F. Hashim, S.J. Hashim, and B.M. Ali, \u201cAn efficient authentication and key agreement protocol for 4G (LTE) networks,\u201d Region 10 Symposium, 2014 IEEE, pp.502-507, April 2014.","DOI":"10.1109\/TENCONSpring.2014.6863085"},{"key":"11","unstructured":"[11] M. Ramadan, F. Li, C. Xu, A. Mohamed, H. Abdalla, and A. Abdalla, \u201cUser-to-user mutual authentication and key agreement scheme for LTE cellular system,\u201d Int. J. Network Security, vol.18, no.4, pp.769-781, 2016."},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] D. Forsberg, H. Leping, K. Tsuyoshi, and S. Alanara, \u201cEnhancing security and privacy in 3GPP E-UTRAN radio interface,\u201d Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pp.1-5, Sept. 2007.","DOI":"10.1109\/PIMRC.2007.4394792"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] D. Yu and W. Wen, \u201cNon-access-stratum request attack in E-UTRAN,\u201d Computing, Communications and Applications Conference (ComComAp), 2012, pp.48-53, Jan. 2012.","DOI":"10.1109\/ComComAp.2012.6154001"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] D. Adrian, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-B\u00e9guelin, P. Zimmermann, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J.A. Halderman, N. Heninger, D. Springall, and E. Thom\u00e9, \u201cImperfect forward secrecy: How diffie-hellman fails in practice,\u201d Proc. 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.5-17, ACM, 2015.","DOI":"10.1145\/2810103.2813707"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E100.B\/5\/E100.B_2016EBP3267\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:00:38Z","timestamp":1704898838000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E100.B\/5\/E100.B_2016EBP3267\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2016ebp3267","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}