سال انتشار: ۱۳۸۶
محل انتشار: پانزدهیمن کنفرانس مهندسی برق ایران
تعداد صفحات: ۸
Salahi – Iran Telecommunication Research Center
Mohammad Pour – Mobile comPanY of Iran
In the next generation of mobile communication system, it is likely that public key based authentication protocols will be employed as they impose several advantages over secret key protocols. Eliptic curves cryptography is going to replace traditional methods because of its marvelous advantages. In these regards . ASK- WAP and UAP have been introduced. We analyze these protocols from different security an communication aspects and we show that although UAP is compensating some of ASK WAP vulnerabilities, it has some weaknesses. We suggest other derivations of ASK-WAP and UAP to improve them to meet security goals, while meeting communicational concerns.