Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network

被引:0
作者
Li Xiehua [1 ]
Wang Yongjun [2 ]
机构
[1] Hunan Univ, Sch Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 410082, Hunan, Peoples R China
来源
2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2011年
关键词
LTE/SAE network; EPS AKA; WPKI; formal verification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The 3rd Generation Partnership (3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next generation mobile communication system. In the LTE/SAE architecture, EPS AKA(Evolved Packet System Authentication and Key Agreement) procedure is used to provide mutual authentication between the user and the network. However the EPS AKA has several vulnerabilities such as disclosure of user identity, man-in-middle attack, etc. Therefore, this paper analyzes the deficiencies of the EPS AKA, and proposes a Security Enhanced Authentication and Key agreement (SE-EPS AKA) based on Wireless Public Key Infrastructure (WPKI). Then, the new SEEPS AKA has been proved with the formal verification method, and the proof result shows that the SE-EPS AKA can satisfy the security and efficiency propoerties in the LTE/SAE architecture.
引用
收藏
页数:4
相关论文
共 36 条
[21]   Robust Pre-Authentication Protocol for Wireless Network [J].
Abdrabou, Mohammed Aly .
2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, :331-336
[22]   Accessibility Degradation Prediction on LTE/SAE Network Using Discrete Time Markov Chain (DTMC) Model [J].
Hendrawan .
JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2019, 13 (01) :1-18
[23]   Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther [J].
Pradeep, R. ;
Sunitha, N. R. ;
Ravi, V ;
Verma, Sushma .
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
[24]   Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool [J].
Asadi, Sepideh ;
Shahhoseini, Hadi Shahriar .
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, :1060-1064
[25]   A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks [J].
Wu, Fan ;
Xu, Lili ;
Kumari, Saru ;
Li, Xiong ;
Das, Ashok Kumar ;
Khan, Muhammad Khurram ;
Karuppiah, Marimuthu ;
Baliyan, Renuka .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) :3527-3542
[26]   An efficient and secure mutual authentication protocol in wireless body area network [J].
Kumar M. ;
Hussain S.Z. .
EAI Endorsed Transactions on Pervasive Health and Technology, 2023, 9 :1-13
[27]   PUF-based mutual authentication and session key establishment protocol for IoT devices [J].
Zerrouki F. ;
Ouchani S. ;
Bouarfa H. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (09) :12575-12593
[28]   An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions [J].
Khadem, Behrooz ;
Suteh, Amin Masoumi ;
Ahmad, Musheer ;
Alkhayyat, Ahmed ;
Farash, Mohammad Sabzinejad ;
Khalifa, Hany S. .
IEEE ACCESS, 2021, 9 :78463-78473
[29]   A Train-ground Security Authentication Scheme Based on Anonymous Proxy Signature for LTE-R System [J].
Wang Y. ;
Zhang W. ;
Wang X. ;
Lin W. ;
Gao S. ;
Wu W. .
Tiedao Xuebao/Journal of the China Railway Society, 2020, 42 (03) :76-84
[30]   Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management [J].
Hegde, Manjunath ;
Rao, Rohini R. ;
Bhat, Radhakrishna .
IEEE ACCESS, 2024, 12 :78173-78192