Improved EAP-AKA Protocol Based on Redirection Defense

被引:0
|
作者
Yu, Binbin [1 ]
Zhang, Jianwu [1 ]
Wu, Zhendong [1 ]
机构
[1] Hangzhou Dianzi Univ, Coll Telecommun Engn, Hangzhou 310018, Zhejiang, Peoples R China
关键词
heterogeneous networks; EAP-AKA; 3G; WLAN; redirection attack;
D O I
10.1109/3PGCIC.2014.106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.
引用
收藏
页码:543 / 547
页数:5
相关论文
共 50 条
  • [1] Formal verification of EAP-AKA with improved authentication tests
    Li, Xiehua
    Hao, Liming
    Yang, Shutang
    Li, Jianhua
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1214 - 1217
  • [2] Secure 3GPP-WLAN Authentication Protocol Based on EAP-AKA
    Patkar, Shruti S.
    Ambawade, Dayanand D.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1011 - 1016
  • [3] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [4] EAP-AKA研究与改进
    张树彬
    孙皓
    吴越
    信息安全与通信保密, 2007, (10) : 60 - 62
  • [5] Design and Implementation of Active Access Control System by Using NFC-based EAP-AKA Protocol
    Seung-Su Yang
    Young-Hwan Jang
    Min-Hyung Park
    Seok-Cheon Park
    Hyung-Joon Kim
    Wireless Personal Communications, 2021, 118 : 2487 - 2503
  • [6] Security Analysis of 5G Network EAP-AKA' Protocol Based on Lowe's Taxonomy
    Liu Caixia
    Hu Xinxin
    Liu Shuxin
    You Wei
    Zhao Yu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (08) : 1800 - 1807
  • [7] Design and Implementation of Active Access Control System by Using NFC-based EAP-AKA Protocol
    Yang, Seung-Su
    Jang, Young-Hwan
    Park, Min-Hyung
    Park, Seok-Cheon
    Kim, Hyung-Joon
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 2487 - 2503
  • [8] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    Array, 2022, 16
  • [9] AN OPTIMAL INTERWORKING AUTHENTICATION SCHEME BASED ON EAP-AKA FOR HETEROGENEOUS ACCESS NETWORKS
    Song, Mei
    Wang, Li
    Huang, Jianwen
    Song, Junde
    2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 1003 - +
  • [10] EAP-AKA协议的分析和改进
    张胜
    徐国爱
    胡正名
    杨义先
    计算机应用研究, 2005, (07) : 234 - 236