论文介绍了EAP—AKA认证方法,并对其安全进行评估,指出其存存的一些安全漏洞。文章分析了可能存在的攻击,针对问题提出改进意见,并说明丁修改后协议的可行性。
This paper describes EAP-AKA authentication method. By giving the safety assessment of the authentication method, some security loopholes are pointed out, the possible attacks analyzed, some improvement suggestions according to these problems proposed, and the feasibility of the modified agreement illustrated.