On the security of an enhanced UMTS authentication and key agreement protocol
نویسندگان
چکیده
In this paper, we propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, “home network should be partially trusted in an authentication scheme” to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ”subscriber identity/location confidential” and ”non-repudiation services” are solved in the scheme. The paper provides computational analysis, messages transmission length analysis to the proposed scheme. Furthermore, comparisons with other schemes are also given. The results demonstrate that the proposed scheme is practical and secure.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملSecurity Mechanisms in UMTS
This contribution presents an overview of the security of the 3 generation mobile radio system UMTS as currently standardised by the 3 Generation Partnership Project 3GPP. We discuss the underlying principles and show to which extent the security of 2 generation systems as GSM is improved and enhanced by UMTS. The UMTS Authentication and Key Agreement protocol, the security algorithms deployed ...
متن کاملPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper, we investigate UMTS AKA and some other proposed schemes. Then, we explore the known weaknesses of the previous frameworks suggested for the UMTS AKA pro...
متن کاملAn effective AKA protocol for UMTS
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...
متن کاملComputational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
One of the forerunners and main candidates for the fourth generation (4G) generation mobile communication system is commonly known under the name Long-Term Evolution (LTE) and its standard is produced and maintained by the international 3rd Generation Partnership Program (3GPP) consortium. The LTE Authentication and Key Agreement (AKA) protocol design is based on the Universal Mobile Telecommun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- European Transactions on Telecommunications
دوره 22 شماره
صفحات -
تاریخ انتشار 2011