The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

被引:0
|
作者
Park, Yong-Seok [1 ]
Kim, Choon-Soo [1 ]
Ryou, Jae-Cheol [2 ]
机构
[1] Natl Secur Res Inst, Daejeon, South Korea
[2] Chungnam Natl Univ, Internet Intrus Response Technol Res Ctr, Daejeon, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
TRS; TETRA; authentication; authentication key; ISSI;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The TETRA system provides an authentication service which permits only the authorized terminal to access its network by verifying that the terminal equipment and the authentication center have the identical authentication key using challenge-response protocol. However, while TETRA standard authentication protocol is able to block cloned terminals that have cloned a terminal identifier called Individual Short Subscriber Identity (ISSI), it is currently unable to prevent the illegal use of cloned terminals that have cloned both ISSI and the authentication key. In this paper, we briefly describe TETRA standard authentication protocol defined by European Telecommunications Standards Institute (ETSI), followed by a brief description of authentication key generation/distribution/injection models during its authentication process. Then we analyze the threat of cloned terminals in the case of authentication key being exposed during the process of distributing to the authentication center. Finally we propose a new authentication protocol that can prevent cloned terminals that have cloned both ISSI and the authentication key from illegally accessing the network.
引用
收藏
页码:1469 / 1473
页数:5
相关论文
共 50 条
  • [21] Analysis and design of a smart card based authentication protocol
    Yeh, Kuo-Hui
    Tsai, Kuo-Yu
    Hou, Jia-Li
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (12): : 909 - 917
  • [22] Analysis of the DCS.v2 authentication protocol
    Newman, R
    Dyson, L
    Sabina, O
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION, 1998, 3456 : 36 - 44
  • [23] Analysis and design of a smart card based authentication protocol
    Kuo-Hui Yeh
    Kuo-Yu Tsai
    Jia-Li Hou
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 909 - 917
  • [24] Design and Analysis of Lightweight Authentication Protocol for Securing IoD
    Jan, Saeed Ullah
    Qayum, Fawad
    Khan, Habib Ullah
    IEEE ACCESS, 2021, 9 : 69287 - 69306
  • [25] On the problem of authentication in a quantum protocol to detect traffic analysis
    Müller-Quade, J
    Steinwandt, R
    QUANTUM INFORMATION & COMPUTATION, 2003, 3 (01) : 48 - 54
  • [26] Design and Formal Analysis of Highly Effective Authentication Protocol
    Shi, Mingxia
    Li, Huaiqiang
    Chen, Li
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3137 - 3142
  • [27] Cryptanalysis and Improvement of Chandrakar and Om's Remote User Authentication Protocol for the Multiserver Environment
    Chen, Chien-ming
    Xiang, Bin
    Wang, Guang-jie
    Huang, Yan-yu
    2018 INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK AND ARTIFICIAL INTELLIGENCE (CNAI 2018), 2018, : 125 - 130
  • [28] Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Taeshik Shon
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Journal of Medical Systems, 2015, 39
  • [29] Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Shon, Taeshik
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
  • [30] Security Improvement on a Biometrics-Based Authentication Protocol for Multi-server Environment
    Gu, Yi
    Li, Shengqiang
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1322 - 1327