On the security of an enhanced UMTS authentication and key agreement protocol

نویسندگان

  • Min-Shiang Hwang
  • Song-Kong Chong
  • Hsia-Hung Ou
چکیده

In this paper, we propose a practical and secure authentication and key agreement scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, “home network should be partially trusted in an authentication scheme” to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ”subscriber identity/location confidential” and ”non-repudiation services” are solved in the scheme. The paper provides computational analysis, messages transmission length analysis to the proposed scheme. Furthermore, comparisons with other schemes are also given. The results demonstrate that the proposed scheme is practical and secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Security Mechanisms in UMTS

This contribution presents an overview of the security of the 3 generation mobile radio system UMTS as currently standardised by the 3 Generation Partnership Project 3GPP. We discuss the underlying principles and show to which extent the security of 2 generation systems as GSM is improved and enhanced by UMTS. The UMTS Authentication and Key Agreement protocol, the security algorithms deployed ...

متن کامل

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup

Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper, we investigate UMTS AKA and some other proposed schemes. Then, we explore the known weaknesses of the previous frameworks suggested for the UMTS AKA pro...

متن کامل

An effective AKA protocol for UMTS

UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...

متن کامل

Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols

One of the forerunners and main candidates for the fourth generation (4G) generation mobile communication system is commonly known under the name Long-Term Evolution (LTE) and its standard is produced and maintained by the international 3rd Generation Partnership Program (3GPP) consortium. The LTE Authentication and Key Agreement (AKA) protocol design is based on the Universal Mobile Telecommun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • European Transactions on Telecommunications

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2011