Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol


  • Ja'afer M. al Saraireh Applied Science University, Amman 11961, Jordan
  • Saleh S. Saraireh Philadelphia University, Amman 11961, Jordan
  • Mohammad S. Saraireh Mutah University, Mutah 61710, Jordan
  • Mohammad M. al Nabhan Jarash University, Amman 11961, Jordan


3G, Authentication, Security, Mobile Station, BAN


This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AKA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AKA (E-AKA). The E-AKA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AKA protocol is more robust than the current AKA protocol.


Download data is not yet available.


[1] Al-Saraireh J. & Yousef S., (2006) “A New Authentication Protocol for UMTS Mobile Networks”, EURASIP Journal on wireless communications and networking, Vol. 2006, pp1-10.
[2] Zhang M. & Fang Y., (2005) “Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol”, IEEE Transactions on wireless communications, Vol. 4, No. 2, pp734–742.
[3] Lin Y & Chen Y., (2003) “Reducing Authentication Signaling Traffic in Third-Generation Mobile Network”, IEEE Transactions on Wireless Communications, Vol. 2, No. 3, pp493-501.
[4] Huang Y., Shen Y., Shieh S., Wang H. & Lin C., (2009)“Provable Secure AKA Scheme with Reliable Key Delegation in UMTS”, Secure Software Integration and Reliability Improvement, 2009. SSIRI 2009. Third IEEE International Conference, Vol. 2009, pp243-252.
[5] Al-Saraireh J. & Yousef S., (2007) “Analytical Model: Authentication Transmission Overhead between Entities in Mobile Networks”, Elsevier, Computer Communications Journal, Vol. 30, No. 9, pp1713-1720.
[6] Al-Saraireh J., (2011) “Efficient and Secure Authentication and Key Agreement Protocol”, International Journal of UbiCom (IJU), Vol. 2, No. 2.
[7] Li H., Guo S., Zheng K., Chen Z. & Cui J., (2009) “Improved Adoptable Scheme for Authentication and Key Agreement”, IEEE International Conference on Management and Service Science (MASS 2009), pp. 1-4, print ISBN: 978-1-14244-4638-4, DOI: 10.1109/ICMSS.2009.5301997
[8] GPP TS 33.102 V8.0.0, (2008) “3GPP Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 8)”, 3 rd Generation Partnership Project.
[9] Harn L. & Hsin W., (2003) “On the security of wireless network access with enhancements”, in Proceedings of the 2003 ACM workshop on Wireless security, San Diego, USA, Sep. 19 2003, pp88–95.
[10] Juang W.S. & Wu J.L., (2007) “Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection”, IEEE Communications Society, Proceedings of the WCNC.
[11] Farhat F., Salimi S. & Salahi A., (2009) “An Extended Authentication and Key Agreement Protocol of UMTS”, Information Security Practice and Experience, Lecture Notes in Computer Science, Vol. 5451/2009, pp230-244, DOI: 10.1007/978-3-642-00843-6_21
[12] Min-Shiang H., Song-Kong C. & Hsia- Hung O., (2010) “On the security of an enhanced UMTS authentication and key agreement protocol”, European Transactions on Telecommunications. DOI: 10.1002/ett.1460
[13] Burrows M., Abadi M., & Needham R., (1989) “A logic of Authentication”, Digital Systems Research Center.
[14] Zhang J., Chen G., & Deng F., (2008) “A New Mutual Authentication and Key Agreement Protocol for Mobile Communications”, International Conference on Wireless Communications, Networking and Mobile Computing (IEEE WICOM 2008), pp. 1-3. ISBN 978-1-4244- 2107-0, DOI: 10.1109/WiCom.2008.2124
[15] Chang C., Pan H., Jia H., (2008) “A Secure Message Communication Protocol”. International Journal of Automation and




How to Cite

Saraireh, J. M. al, Saraireh, S. S., Saraireh, M. S., & Nabhan, M. M. al. (2011). Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol. Journal of Computer Science and Technology, 11(02), p. 86–92. Retrieved from



Original Articles