DS-AKA-A Novel Secured Authentication Protocol for LTE-A Using Public Key Cryptography

被引:1
作者
Prasad, M. [1 ]
Manoharan, R. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 04期
关键词
LTE-A; AKA; ElGamal; Diffie-hellman key exchange; EPS-AKA; AGREEMENT; SCHEME; NETWORKS; CRYPTANALYSIS;
D O I
10.6138/JIT.2017.18.4.20150121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current development of IP based 4G system is the Long Term Evolution-Advanced (LTE-A), which focuses on the integration of existing wireless technologies in order to provide an extended service for all mobile users. LTE-A system uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol to mitigate the security issues and the cloning problem. However, there exist vulnerabilities like Redirection, Denial of Service and Man-in-the-Middle attacks which may lead the eavesdroppers to utilize and misuse the subscriber's resources. Therefore, in this paper an enhanced authentication and key agreement protocol namely DS-AKA is developed to ensure the security and provide solutions to the vulnerabilities present in the exiting AKA authentication schemes. DS-AKA uses ElGamal Digital signature and Diffie-Hellman key exchange algorithm to establish authentication in all stages between the User Equipment (UE) and Evolved NodeB (eNB). DS-AKA protocol is designed in such a way that it reduces the bandwidth utilization and the number of transactions for the authentication process, thereby it provides greater scalability. The proposed protocol is simulated using NS3 with LENA LTE module and the performances are compared with the existing AKA schemes. The proposed protocol was extensively analyzed and formal verification was carried out using ProVerif and found that DS-AKA is more secured against various malicious attacks.
引用
收藏
页码:753 / 763
页数:11
相关论文
共 27 条
[1]  
3GPP, 2012, 33401 3GPP
[2]  
3GPP, 2015, 36913 3GPP
[3]  
*3GPP, 2012, 36300 3GPP
[4]  
Blanchet B., PROVERIF CRYPTOGRAPH
[5]  
Brouet Jerome, 2011, IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011), P447, DOI 10.1049/cp.2011.0927
[6]   A Survey on Security Aspects for LTE and LTE-A Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Zhang, Yueyu ;
Luo, Zhenxing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :283-302
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Gòdor G, 2006, INT J COMPUT SCI NET, V6, P126
[10]   An authenticated group key distribution protocol based on the generalized Chinese remainder theorem [J].
Guo, Cheng ;
Chang, Chin-Chen .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (01) :126-134