Performance and security enhanced authentication and key agreement protocol for SAE/LTE network

被引:32
作者
Degefa, Fikadu B. [1 ]
Lee, Donghoon [1 ]
Kim, Jiye [1 ]
Choi, Younsung [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
基金
新加坡国家研究基金会;
关键词
EPS AKA; LTE authentication; LTE key agreement; User EqUipment(UE) authentication; 3GPP; 3GPP AUTHENTICATION;
D O I
10.1016/j.comnet.2015.11.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Long Term Evolution has been one of the promising technologies of current wireless communication systems. Quality of service and data rate contribute for the robustness of the field. These two factors are the sum up of transmission rate, security delay, delay variation and some other communication factors. Despite its high data rate and quality of service, Long Term Evolution has some drawbacks as far as the security of this technology is concerned. Particularly, there are some security holes in authenticating users for access in the domain of Access Network. For instance, when User Equipment requests for attachment, the International Mobile Subscriber Identity (IMSI) is sent over network without security protection, hence privacy does not hold. In addition, many parameters are generated by invoking a function with only one input key by which compromising this key results in the whole failure of the system security. So as to mitigate these and some other huge security problems, the researchers, propose an improved approach without adding extra cost so that it can be implemented within the same environment as the existing security system (Evolved Packet System Authentication and Key agreement). As one of the performance enhancements, fetching authentication vectors from foreign network is enabled instead of fetching from home network, which significantly reduces the authentication delay and message overhead. Generally, the purpose is to boost the security level and performance of the protocol keeping the architecture of the system as similar as the conventional security system. These has been exhaustively analyzed and verified under network as well as security verification and simulation tools. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:145 / 163
页数:19
相关论文
共 33 条
[1]  
Abdo Jacques Bou, 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), P73, DOI 10.1109/RELABIRA.2012.6235098
[2]  
Ahmadi S., 2014, LTE ADV APRACTICAL S
[3]  
[Anonymous], 1996, IEEE PERS COMMUN, P34
[4]  
[Anonymous], 2011, 7 INT C WIRELESS COM
[5]  
[Anonymous], 2013, 33401 3GPPTS
[6]  
AVISPA Project, 2014, AUT VAL INT SEC PROT
[7]   A Survey on Security Aspects for LTE and LTE-A Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Zhang, Yueyu ;
Luo, Zhenxing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :283-302
[8]   A simple and robust handover authentication between HeNB and eNB in LTE networks [J].
Cao, Jin ;
Li, Hui ;
Ma, Maode ;
Zhang, Yueyu ;
Lai, Chengzhe .
COMPUTER NETWORKS, 2012, 56 (08) :2119-2131
[9]  
Deng YP, 2009, 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, P557, DOI 10.1109/ICNIDC.2009.5360865
[10]  
Forsberg D., 2013, LTE SECURITY, V2nd