Lee, C.C., Hwang, M.-S., Yang, W.-P. Extension of the GSM authentication protocol. IEE Proceedings-Communications, 150 (2), 91-95. Shen J., Lin C. Y., Yang H. W. (2005) Crypto-analysis of a new effective MAKEP for wireless communications. International Journal of Network Security 1 (2): 118-121 Huang, C.M., Li, J. W.

(2005). Key authentication and agreement protocol for low bandwidth UMTS. 19th International Conference on Information Network and Applications (AINA 2005) (p. 392-397). Lee C.C., Hwang M.-S., Liao I. E. (2008) A new authentication protocol based on the transmission of needles for mobile communication. Wireless Communication and Mobile Computing 8: 661-672 Choi, Y., Kim, S. (2004). Improved privacy and authentication in the mobile phone. In Proceedings of workshop on information security applications (WISA 2004), 14-16.

Chang C.C., Lee J. S., Chang Y. F. (2005) Effective GSM authentication protocols. Computer Communications 28: 921-928 Yang C.C., Chu K. H., Yang Y. W. (2006) 3G and WLAN Interworking Security: current and key state.

International Journal of Network Security 2 (1): 1-13 Juang, W. S., Wu, J. L. (2007). Effective 3GPP authentication and key agreement with robust user privacy protection. In the IEEE Communication and Network Conference (WCNC2007) (p. 2720-2725). Recently, Zhang and Fang proposed a security analysis and improvements to 3GPP authentication and key protocol (AP-AKA). Extensions of 3GPP authentication and the key MOU are proposed to improve some of the disadvantages of current third-generation wireless communications. It also eliminates the need for synchronization between a mobile station and its home network. However, this document shows that the AP-AKA has some drawbacks, including the huge bandwidth consumption between the foreign network and the home network, the overhead of the space stored on the foreign network and the domestic network overloaded with the authentication of mobile stations. As a result, it is proposed to extend the AP-AKA in order to improve these disadvantages while preserving the superior benefits of ap-AKA.

3rd generation partnership project. (2004). Technical services for specification and systems groups, 3G security, cryptographic algorithm requirements (version 6). 3GPP TS 33.105 V6.0.0. Lee C.C., Hwang M.-S., Liao I. E. (2006) Improved security for a new anonymity authentication scheme for wireless environments. IEEE Transactions on Industrial Electronics 53 (5): 1683-1687 Burrows M., Abadi M., Needham R. (1990) A Logic of Authentication. ACM Transactions on Computer Systems 8 (1): 18-36 Dominguez A. P. (2006) Cryptanalysis of Park`s authentication protocol in mobile wireless systems.

International Journal of Network Security 3(3): 279-282 Department of Computer Science and Information Engineering, Chaoyang University of Technology, No. 168, Jifong E. Rd., Wufong Township, Taichung, 41349, Taiwan, ROC . . Please try to update the page. If this does not work, please contact the support so that we can solve the problem. . You can also search for this author in PubMed Google Scholar This is a preview of the content of the subscription, sign up to check the access. . This research was partially supported by the National Science Council, Taiwan, ROC, under the contract number: NSC100-2221-E-030-015.