Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: A New Authentication Protocol for UMTS Mobile Networks Ja’afer Al-Saraireh and Sufian Yousef | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2006 Article ID 98107 Pages 1-10 DOI WCN 2006 98107 A New Authentication Protocol for UMTS Mobile Networks Ja afer Al-Saraireh and Sufian Yousef Faculty of Science and Technology Anglia Ruskin University Bishop Hall Lane Chelmsford CM1 1SQ UK Received 28 November 2005 Revised 7 July 2006 Accepted 16 August 2006 Recommended for Publication by Kamesh Namuduri This paper analyzes the authentication and key agreement AKA protocol for universal mobile telecommunications system UMTS mobile networks where a new protocol is proposed. In our proposed protocol the mobile station is responsible for generating of authentication token AUTN and random number RAND . The home location register is responsible for comparison of response and expected response to take a decision. Therefore the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay call setup time and signalling traffic are minimized in the proposed protocol. A fluid mobility model is used to investigate the performance of signalling traffic and load transaction messages between mobile database such as home location register HLR and visitor location register VLR for both the current protocol and the proposed protocol. The simulation results show that the authentication delay and current load transaction messages between entities and bandwidth are minimized as compared to current protocol. Therefore the performance and the authentication delay time have been improved significantly. Copyright 2006 J. Al-Saraireh and S. Yousef. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION In order to provide security services in wireless networks authentication