Header menu link for other important links
X
Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems
, R. Muthaiah, K. Thenmozhi, P.I. Swaminathan
Published in Springer New York LLC
2016
Volume: 75
   
Issue: 10
Pages: 5795 - 5817
Abstract
Authenticated key agreement (AKA) is useful to preserve the secret (private) key for the data being transmitted over an insecure Thus, this paper proposes the strategies, such as short-term and long-term private keys for the three party authentication and key agreement (3PAKA) protocol. Recently, the IP Multimedia server and client systems have been sprung up for the Telecom Industry, though the systems have not had any proficient authentication mechanism for the fulfillment of security properties and mitigation of signal congestion, bandwidth consumption and end-to-end voice call delay. To address this issue, we present a novel 3PAKA that duplicates the long-term and short-term private keys to alleviate the signal congestion of the multimedia systems. It is then analyzed in the real time multimedia server–client systems to examine the metrics realistically. Besides, we employ the strategy of random Challenge-Response (CR) technique to declare the clock synchronization as invalid. © 2015, Springer Science+Business Media New York.
About the journal
JournalData powered by TypesetMultimedia Tools and Applications
PublisherData powered by TypesetSpringer New York LLC
ISSN13807501