Improved EAP-AKA Protocol Based on Redirection Defense

被引:0
|
作者
Yu, Binbin [1 ]
Zhang, Jianwu [1 ]
Wu, Zhendong [1 ]
机构
[1] Hangzhou Dianzi Univ, Coll Telecommun Engn, Hangzhou 310018, Zhejiang, Peoples R China
关键词
heterogeneous networks; EAP-AKA; 3G; WLAN; redirection attack;
D O I
10.1109/3PGCIC.2014.106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.
引用
收藏
页码:543 / 547
页数:5
相关论文
共 50 条
  • [31] 3G-WLAN互联网络中EAP-AKA协议的分析与改进
    许万福
    侯惠芳
    计算机工程与应用 , 2010, (32) : 81 - 83+151
  • [32] Use of EAP-AKA, IETF hokey and AAA mechanisms to provide access and handover security and 3G-802.16m interworking
    Nakhjiri, Madjid
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 4059 - 4063
  • [33] WLAN Authentication System Based on the Improved EAP-TLS Protocol
    Huang, Weili
    Li, Renle
    PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 112 - 115
  • [34] iZKP-AKA: A secure and improved ZKP-AKA protocol for sustainable healthcare
    Kumar, Shubham
    Kumar, Kanhaiya
    Anand, Abhishek
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Braeken, An
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122
  • [35] An Improved Authentication Protocol with Anonymous Access based o EAP-SAKE
    He Lei
    Lu Xin-mei
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 144 - +
  • [36] An improved and provably secure symmetric-key based 5G-AKA Protocol
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Pandey, Pradumn Kumar
    Braeken, An
    Liyange, Madhusanka
    COMPUTER NETWORKS, 2022, 218
  • [37] An Authentication Protocol based on EAP-PAX for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 164 - +
  • [38] An Authentication Protocol Based on EAP-EKE for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 10 - 13
  • [39] Improved mechanism of AKA authentication based on PGP encryption algorithm
    Zhang, Wenhua
    Liu, Zhongxin
    Chen, Zengqiang
    Yuan, Zhuzhi
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (23):
  • [40] A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS
    Lo, Jung-Wen
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Chu, Yen-Ping
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (11): : 5249 - 5258