The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

被引:0
|
作者
Park, Yong-Seok [1 ]
Kim, Choon-Soo [1 ]
Ryou, Jae-Cheol [2 ]
机构
[1] Natl Secur Res Inst, Daejeon, South Korea
[2] Chungnam Natl Univ, Internet Intrus Response Technol Res Ctr, Daejeon, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
TRS; TETRA; authentication; authentication key; ISSI;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The TETRA system provides an authentication service which permits only the authorized terminal to access its network by verifying that the terminal equipment and the authentication center have the identical authentication key using challenge-response protocol. However, while TETRA standard authentication protocol is able to block cloned terminals that have cloned a terminal identifier called Individual Short Subscriber Identity (ISSI), it is currently unable to prevent the illegal use of cloned terminals that have cloned both ISSI and the authentication key. In this paper, we briefly describe TETRA standard authentication protocol defined by European Telecommunications Standards Institute (ETSI), followed by a brief description of authentication key generation/distribution/injection models during its authentication process. Then we analyze the threat of cloned terminals in the case of authentication key being exposed during the process of distributing to the authentication center. Finally we propose a new authentication protocol that can prevent cloned terminals that have cloned both ISSI and the authentication key from illegally accessing the network.
引用
收藏
页码:1469 / 1473
页数:5
相关论文
共 50 条
  • [31] Maille authentication - A novel protocol for distributed authentication
    Fritz, A
    Paris, JF
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 309 - 322
  • [32] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [33] Two-factor remote authentication protocol and BAN Analysis
    Zhang, Lihua
    Bai, Erfei
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 411 - 414
  • [34] Performace Analysis of authentication method for Proxy Mobile IP protocol
    Tie Ling
    He Di
    Li Jian Hua
    Tang Jun Hua
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2048 - 2051
  • [35] Security analysis of an authentication and key agreement protocol for satellite communications
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4300 - 4306
  • [36] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [37] Security Analysis of a Cocktail Protocol with the Authentication and Key Agreement on the UMTS
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (04) : 366 - 368
  • [38] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [39] Reducing Vulnerability of a Fingerprint Authentication System
    Ram, A. Athira
    Jyothis, T. S.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 157 - 167
  • [40] A Comparative Analysis and Improvement of Smart Card based Authentication Scheme
    Panwar, Narendra
    Rauthan, Manmohan Singh
    Agarwal, Amit
    2016 NINTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2016, : 345 - 348