ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks

被引:14
作者
Saxena, Neetesh [1 ,2 ]
Thomas, Jaya [1 ,2 ]
Chaudhari, Narendra S. [3 ,4 ]
机构
[1] SUNY, Dept Comp Sci, Inchon, South Korea
[2] SUNY Stony Brook, Dept Comp Sci, New York, NY 11794 USA
[3] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
[4] Indian Inst Technol, Discipline Comp Sci & Engn, Indore 453441, Madhya Pradesh, India
关键词
UMTS; Man-in-the-middle; DoS; Redirection; Authentication; 3GPP AUTHENTICATION;
D O I
10.1007/s11277-015-2551-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXT-AKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA.
引用
收藏
页码:1981 / 2012
页数:32
相关论文
共 45 条
[1]  
*3 GEN PARTN PROJ, 2001, 33102 3GPP TS
[2]  
3rd Generation Partnership Project, 2001, 2 3 GEN PARTN PROJ
[3]  
3rd Generation Partnership Project, 1999, 33909 3GPP TR
[4]  
Akhtar J. A. M. N., 2010, INT J MULTIMEDIA UBI, V5, P1
[5]  
Al-Saraireh Ja'afer, 2006, EURASIP J WIREL COMM, V2006, P19
[6]  
Alex B., 2010, KEY RECOVERY ATTACKS
[7]  
[Anonymous], 2004, Proceedings of the 3rd ACM Workshop on Wireless Security
[8]  
[Anonymous], 2009, INT J NETW SECUR
[9]  
[Anonymous], 97984 ISOIEC
[10]  
[Anonymous], DATENSCHUTZ DATENSIC