Efficient and Secure Modified Cocktail-AKA Protocol for UMTS Network

被引:0
作者
Parne, Balu L. [1 ]
Gupta, Shubham [1 ]
Chaudhari, Narendra S. [1 ,2 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
[2] Indian Inst Technol Indore, Dept Comp Sci & Engn, Indore, Madhya Pradesh, India
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST) | 2016年
关键词
UMTS-AKA; Cocktail-AKA; Redirection Attack; DoS Attack; KEY AGREEMENT PROTOCOL; AUTHENTICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication and key agreement (AKA) protocols of Universal Mobile Telecommunication System (UMTS) have been proposed to overcome the weakness observed in the 2nd generation mobile communication system. The UMTS-AKA is susceptible to different attacks as redirection attack, denial of service attack, man in the middle attack, impersonation attack, and identity catching attack. Many protocols were proposed to defeat these type of attack on the UMTS network. Cocktail-AKA is one of the proposed protocol to overcome the existing problem of UMTS-AKA and to avoid the different attacks on it. In this paper, first we show that the cocktail-AKA is vulnerable to redirection attack, denial of service attack and identity catching attack. Later, we propose the possible countermeasure to each identified attack. We modify the cocktail-AKA protocol in such a way that it vanquish all the attacks on it. Finally, we show the qualitative and security analysis of the proposed modified cocktail-AKA protocol with respect to various issues and prevention from different attacks. The qualitative and quantitative analysis show that the proposed protocol has less computation and communication overhead compare to other UMTS-AKA protocol.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 12 条
[11]   ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks [J].
Saxena, Neetesh ;
Thomas, Jaya ;
Chaudhari, Narendra S. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) :1981-2012
[12]   Security Analysis of a Cocktail Protocol with the Authentication and Key Agreement on the UMTS [J].
Wu, Shuhua ;
Zhu, Yuefei ;
Pu, Qiong .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (04) :366-368