Improved EAP-AKA Protocol Based on Redirection Defense

被引:0
|
作者
Yu, Binbin [1 ]
Zhang, Jianwu [1 ]
Wu, Zhendong [1 ]
机构
[1] Hangzhou Dianzi Univ, Coll Telecommun Engn, Hangzhou 310018, Zhejiang, Peoples R China
关键词
heterogeneous networks; EAP-AKA; 3G; WLAN; redirection attack;
D O I
10.1109/3PGCIC.2014.106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.
引用
收藏
页码:543 / 547
页数:5
相关论文
共 50 条
  • [41] Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks
    Vizvari, Sharareh
    Berangi, Reza
    Nematollahi, Khosro
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 118 - 123
  • [42] A Secure Group-Based AKA Protocol for Machine-Type Communications
    Giustolisi, Rosario
    Gehrmann, Christian
    Ahlstrom, Markus
    Holmberg, Simon
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 3 - 27
  • [43] An enhanced symmetric-key based 5G-AKA protocol
    Munilla, Jorge
    Burmester, Mike
    Barco, Raquel
    COMPUTER NETWORKS, 2021, 198
  • [44] Secure protocol for fast authentication in EAP-Based wireless networks
    Marin, Rafa
    Zapata, Santiago
    Gomez, Antonio F.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1038 - 1051
  • [45] Dynamic EAP Based MAC Protocol for Wireless Body Area Networks
    Enkoji, Ai
    Li, Ming
    Brisky, James Daniel
    Melvin, Ryan
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 531 - 536
  • [46] Cross-Layer AKA Protocol for Industrial Control Based on Channel State Information
    Chen, Yanru
    Yin, Fengming
    Guo, Bing
    Pan, Zhiwen
    Chen, Liangyin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8263 - 8274
  • [47] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [48] A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (04) : 754 - 765
  • [49] Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL
    Zhang, Tong
    Xiao, Meihua
    Ouyang, Ri
    THEORETICAL COMPUTER SCIENCE, NCTCS 2021, 2021, 1494 : 222 - 233
  • [50] A new EAP-based signaling protocol for IEEE 802.11 wireless LANs
    Hecker, A
    Labiod, H
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3214 - 3218