Enhanced Adaptive Security Protocol in Lte Aka
نویسندگان
چکیده
A Telecommunication systems trust and privacy is as good as its security mechanism. Its security design keep evolving over time as new treats and technology evolve. LTE/SAE is 3GPP’s wireless Communication new DNA, a move away from a hybrid of packet switched and circuit switched network which 3G networks possess, though with room for backward compatibility. LTE/SAE’s new architecture is a flat IP architecture; it therefore comes with all security issues inherent in IP network coupled with the design having non-3GPP heterogeneous technologies integrated into it. Its’ security cryptography, rides on the good features of 3GPP AKA cryptographic algorithms, used in UMTS and added new ones. Some major security concerns in LTE/SAE from several researchers work points to, user privacy concerns, threats to UE/USIM tracking, base stations and handovers, broadcast or multicast signaling, denial of service (DOS), manipulation of control plane, unauthorized access to network, compromise of eNB credential and physical attack on an eNB protocol attack on eNB and attack on the core network and eNB location based attacks. In this paper, we will be analyzing, LTE/AKA architecture and its vulnerability, after which we will be proposing a protocol, referred to as Security Enhanced Adaptive Protocol (SEAP-AKA), which is to prove to eliminate the importance of synchronization between a cell station and its home system. SEAP-AKA specifies six flows sequence with respect to execution environment. Entities of the new protocol possess flexibility as it adaptively picks out flow for execution, which helps to optimize this efficiency both in the home network and Mobile network. More so, SEAP-AKA will show a Security Enhanced Authentication along with Key Agreement dependent on Wireless Public Key National infrastructure (WPKI). Then, the brand new protocol shall be proved with the formal verification method, and the proof result shall demonstrates the new protocol and how it satisfies the security along with efficiency properties from the LTE/SAE buildings note that, existing 128 bit encryption existing in UMTS is same used here in LTE.
منابع مشابه
Security Enhanced Authentication and Key Agreement Protocol in Next Generation Mobile Network
The 3 Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE) / Long Term Evolution(LTE) for the next generation mobile communication system. In the SAE/LTE architecture, EPS AKA(Evolved Packet System Authentication and Key Agreement) procedure is used to provide mutual authentication between the UE(User Equipment) and the serving network. However the EPS ...
متن کاملComputational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
One of the forerunners and main candidates for the fourth generation (4G) generation mobile communication system is commonly known under the name Long-Term Evolution (LTE) and its standard is produced and maintained by the international 3rd Generation Partnership Program (3GPP) consortium. The LTE Authentication and Key Agreement (AKA) protocol design is based on the Universal Mobile Telecommun...
متن کاملSecurity Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is developing, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-...
متن کاملSE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an authentication and key agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for fourth-generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA inevitably inherits some defects...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014