Security analysis of 3GPP authentication and key agreement protocol

被引:2
|
作者
Lu F. [1 ,2 ,3 ]
Zheng K.-F. [1 ,2 ,3 ]
Niu X.-X. [1 ,2 ,3 ]
Yang Y.-X. [1 ,2 ,3 ]
Li Z.-X. [1 ,2 ,3 ,4 ]
机构
[1] State Key Laboratory of Network and Switching Technology, Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology of Ministry of Education, Beijing University of Posts and Telecommunications
[3] National Engineering Laboratory for Disaster Backup and Recovery
[4] National Cybernet Security Ltd
来源
Ruan Jian Xue Bao/Journal of Software | 2010年 / 21卷 / 07期
关键词
Authentication; Key agreement; Network security; Third-generation; Wireless security;
D O I
10.3724/SP.J.1001.2010.03527
中图分类号
学科分类号
摘要
The Universal Mobile Telecommunication System (UMTS) adopts 3GPP authentication and key agreement (3GPP AKA) protocol as its security framework, and this protocol has made effective improvements on the hidden security problems of GSM (global system for mobile communications). This paper investigates into the security of the 3GPP authentication and key agreement protocol, and analyzes four types of attacks to which it is vulnerable. To solve the security problems mentioned above, it presents an efficient authentication and key agreement protocol, which is based on public key cryptography, under the circumstances of location updating and location immovability, adopts formal analysis to prove the security of two protocols proposed, and compares it with other protocols from the aspect of security. The results show that this proposed protocol can significantly enhance the security of 3GPP AKA protocol. © by Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1768 / 1782
页数:14
相关论文
共 25 条
  • [1] (1999)
  • [2] (2002)
  • [3] (2001)
  • [4] Information technology-Security techniques-Entity authentication-Part4: Mechanisms using a cryptographic check function
  • [5] Lin Y.B., Chen Y.K., Reducing authentication signaling traffic in third-gerneraion mobile network, IEEE Trans. on Wireless Communications, 2, 3, pp. 493-501, (2003)
  • [6] Saraireh J.A., Yousef S., Analyses authentication and key agreement protocol for UMTS mobile networks, Proc. of the 1st Int'l Conf. on Mobile Computing and Wireless Communication, pp. 27-31, (2006)
  • [7] Wu L.Y., Lin Y.B., Authentication vector management for UMTS, IEEE Trans. on Wireless Communications, 6, 11, pp. 4101-4107, (2007)
  • [8] Huang C.M., Li J.W., Authentication and key agreement protocol for UMTS with low bandwidth consumption, Proc. of the 19th Int'l Conf. on Advanced Information Networking and Applications, pp. 392-397, (2005)
  • [9] Saraireh J.A., Yousef S., Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS), Int'l Journal of Theoretical and Applied Computer Sciences, 1, 1, pp. 109-118, (2006)
  • [10] Lee C.C., Hwang M.S., Yang W.P., Extension of authentication protocol for GSM, IEE Proc. of Communications, 150, 2, pp. 91-95, (2003)