The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

被引:0
|
作者
Park, Yong-Seok [1 ]
Kim, Choon-Soo [1 ]
Ryou, Jae-Cheol [2 ]
机构
[1] Natl Secur Res Inst, Daejeon, South Korea
[2] Chungnam Natl Univ, Internet Intrus Response Technol Res Ctr, Daejeon, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
TRS; TETRA; authentication; authentication key; ISSI;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The TETRA system provides an authentication service which permits only the authorized terminal to access its network by verifying that the terminal equipment and the authentication center have the identical authentication key using challenge-response protocol. However, while TETRA standard authentication protocol is able to block cloned terminals that have cloned a terminal identifier called Individual Short Subscriber Identity (ISSI), it is currently unable to prevent the illegal use of cloned terminals that have cloned both ISSI and the authentication key. In this paper, we briefly describe TETRA standard authentication protocol defined by European Telecommunications Standards Institute (ETSI), followed by a brief description of authentication key generation/distribution/injection models during its authentication process. Then we analyze the threat of cloned terminals in the case of authentication key being exposed during the process of distributing to the authentication center. Finally we propose a new authentication protocol that can prevent cloned terminals that have cloned both ISSI and the authentication key from illegally accessing the network.
引用
收藏
页码:1469 / 1473
页数:5
相关论文
共 50 条
  • [41] Security Improvement of the Enhanced 1-round Authentication Protocol for Wireless Body Area Networks
    Izza, Sarah
    Benssalah, Mustapha
    Ouchikh, Rabah
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON APPLIED SMART SYSTEMS (ICASS), 2018,
  • [42] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [43] Security analysis and improvement of return routability protocol
    Qiu, Ying
    Zhou, Jianying
    Deng, Robert
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 174 - 181
  • [44] VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"
    Abidin, Aysajan
    Larsson, Jan-Ake
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2009, 7 (05) : 1047 - 1052
  • [45] Cryptanalysis of a Multifactor Authentication Protocol
    Likitha, Soorea
    Saravanan, R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 35 - 42
  • [46] Lightweight authentication protocol (LAP)
    Chousiadis, C
    Pangalos, G
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 7 - 12
  • [47] Trust Authentication Protocol on the Web
    GUO Ya-jun~ 1
    2. Department of Computer Science
    Wuhan University Journal of Natural Sciences, 2006, (01) : 253 - 255
  • [48] Attack on RADIUS authentication protocol
    Zhao, P
    Cao, XW
    Luo, P
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 208 - 212
  • [49] Cryptanalysis of a User Authentication Protocol
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 27 - 30
  • [50] Guarantee of authentication protocol security
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    Shanghai Jiaotong Daxue Xuebao, 2008, 4 (518-522):