The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

被引:0
|
作者
Park, Yong-Seok [1 ]
Kim, Choon-Soo [1 ]
Ryou, Jae-Cheol [2 ]
机构
[1] Natl Secur Res Inst, Daejeon, South Korea
[2] Chungnam Natl Univ, Internet Intrus Response Technol Res Ctr, Daejeon, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
TRS; TETRA; authentication; authentication key; ISSI;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The TETRA system provides an authentication service which permits only the authorized terminal to access its network by verifying that the terminal equipment and the authentication center have the identical authentication key using challenge-response protocol. However, while TETRA standard authentication protocol is able to block cloned terminals that have cloned a terminal identifier called Individual Short Subscriber Identity (ISSI), it is currently unable to prevent the illegal use of cloned terminals that have cloned both ISSI and the authentication key. In this paper, we briefly describe TETRA standard authentication protocol defined by European Telecommunications Standards Institute (ETSI), followed by a brief description of authentication key generation/distribution/injection models during its authentication process. Then we analyze the threat of cloned terminals in the case of authentication key being exposed during the process of distributing to the authentication center. Finally we propose a new authentication protocol that can prevent cloned terminals that have cloned both ISSI and the authentication key from illegally accessing the network.
引用
收藏
页码:1469 / 1473
页数:5
相关论文
共 50 条
  • [1] A Mixed Mechanism Mutual Authentication Protocol for TETRA
    LI Hui
    National Key Lab
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2005, (03) : 71 - 74
  • [2] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [3] A Novel and Efficient Privacy Preserving TETRA Authentication Protocol
    Zahednejad, Behnam
    Azizi, Mahdi
    Pournaghi, Morteza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 125 - 132
  • [4] Analysis and improvement of a key exchange and authentication protocol in client-server environment
    Li, Yuting
    Cheng, Qingfeng
    Li, Xinghua
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (09) : 3787 - 3799
  • [5] Analysis and improvement of a key exchange and authentication protocol in client-server environment
    Yuting Li
    Qingfeng Cheng
    Xinghua Li
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3787 - 3799
  • [6] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [7] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Arshad, Hamed
    Nikooghadam, Morteza
    JOURNAL OF SUPERCOMPUTING, 2015, 71 (08): : 3163 - 3180
  • [8] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Hamed Arshad
    Morteza Nikooghadam
    The Journal of Supercomputing, 2015, 71 : 3163 - 3180
  • [9] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    Debiao He
    Yuanyuan Zhang
    Jianhua Chen
    Wireless Personal Communications, 2014, 74 : 229 - 243
  • [10] Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems
    Xiao, Feng
    Hu, Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2025, 19 (02): : 589 - 611