3G Networks A solution to Improved Authentication and Key Agreement Protocol
نویسنده
چکیده
With the development of mobile communication network, the requirements of mobile users for data services are higher and higher, which makes data service become more diversiform and various service providers appear on after the other. As a result, data services increasingly become the main service in mobile network. The Universal Mobile Telecommunications System (UMTS) is one of the new ‘third generation’ (3G) mobile cellular communication systems being developed within the framework defined by the International Telecommunications Union (ITU) known as IMT-20001.UMTS aims to provide a broadband, packet-based service for transmitting video, text, digitized voice, and multimedia at data rates of up to 2 Mbps while remaining cost effective. The AKA procedure is the essence of authenticating a user to the network and vice versa. AKA procedures in UMTS have increased security compared with GSM. However, during its development some security problems emerged. Although the authentication and key agreement (AKA) protocol solve some, it still has some flaws such as lacking complete authentication and interworking and so on. In order to those problem preferable, aiming at the security threaten for services based on mobile network and the problems with the existing AKA, the paper analyzes the existing Authentication and Key Agreement (AKA) protocol, and points out the security flaws among it and possible methods of attack. For the security flaws, an improved AKA protocol is proposed. In the end, the paper analyzes the improved AKA protocol. Keywords—UMTS (Universal Mobile Telecommunication Systems), International Telecommunications Union (ITU); Access Points; IMT-20001; 3G, HTTP, FTP; TELNET protocols, IEEE 802.1x protocol with EAP-TTLS; Mutual Authentication; AKA;
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملExperimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks
The SSL/TLS protocol is a de-facto standard that has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future heterogeneous wireless environments. In this paper, we propose potential solutions that this protocol can offer to future “all-IP” heterogeneous mobile networks with particular emphasis on the user’s side. Our approach takes into con...
متن کاملA Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR
Future mobile networking will involve the convergence of different wireless networks such as 2G, 3G, WiMax and Long Term Evolution. The wide scale deployment of such heterogeneous networks will precipitate a radical change in the network infrastructure, where currently closed systems such as 3G will have to operate in an open environment. This brings to the fore certain security issues which mu...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015