Verifiable AKA for beyond 3G wireless packet services

被引:0
作者
Joseph, Vinod Cherian [1 ]
Talukder, Asoke K. [2 ]
机构
[1] Samsung India Software Operat, Bangalore, Karnataka, India
[2] IIIT, Bangalore, Karnataka, India
来源
2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS | 2006年
关键词
security; forward security; AIPN; AKA; authentication; integrity; encryption; beyond; 3G; 3GPP;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Security in third generation wireless systems has been enhanced from second generation systems to support network authentication of devices and enhanced key size. However, the basic model of security for 3G systems is still circuit-switched based. We propose a security model in this paper based on forward security that is more efficient to support packet switched services for beyond 3G networks with negligible overhead on the user equipment or AAA (Authentication, Authorization, and Accounting) Server. Forward Security is applicable with secret keys changing with time periods and could be easily verifiable by the verifier using the single fixed key. The intruder/eavesdropper who is able to compromise a packet would not be able to derive the meaning of the whole data content since the Cipher Key/Integrity Key compromised is only applicable to the packet sent at the current time period. The intruder cannot compromise the packets sent for the packet-switched (PS) session over other time periods and thereby serves to be several times more secure to the existing 3GPP AKA (Authentication and Key Agreement) security model.
引用
收藏
页码:215 / +
页数:2
相关论文
共 9 条
[1]  
*3GPP TS, 42009 3GPP TS
[2]  
*3GPP TS, 33120 3PP TS
[3]  
*3GPP TS, 22978 3GPP TS
[4]  
AMBERKER BB, J BOOK ITALICS
[5]  
ANDERSON R, 1997, 4 ANN C COMP COMM SE
[6]  
[Anonymous], 2002, INTRO CRYPTOGRAPHY P
[7]  
BELLARE M, 1999, LECT NOTES COMPUTER, V1666
[8]  
FIAT A, 1986, LECT NOTES COMPUTER, V263
[9]  
Malkin T, 2002, LECT NOTES COMPUT SC, V2332, P400