Overview security analysis of 3G authentication protocols and technical specifications

被引:0
|
作者
Cao, Chenlei [1 ,2 ]
Zhang, Ru [1 ,2 ]
Niu, Xinxin [1 ,2 ]
Zhou, Linna [3 ]
Zhang, Zhentao [4 ]
机构
[1] Information Security Centre of State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
[4] National Cyber-Net Security Ltd, Beijing 100088, China
来源
关键词
Public key cryptography - Specifications - Network security - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mathematical model of the authentication traffic throughput was developed based on the theory of independent and identically distributed probabilities. The research identifies some security vulnerabilities in these protocols, such as the unidirectional process of entity authentication and the unbalanced distribution of authentication traffic, as well as the system complexity. Future development of the 3G security authentication mechanism can be based on IBC (identity-based cryptography) theory.
引用
收藏
页码:2193 / 2199
相关论文
共 50 条
  • [1] Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
    Yuh-Min Tseng
    Chou-Chen Yang
    Jiann-Haur Su
    [J]. Wireless Personal Communications, 2004, 29 : 351 - 366
  • [2] Authentication and billing protocols for the integration of WLAN and 3G networks
    Tseng, YM
    Yang, CC
    Su, JH
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 351 - 366
  • [3] Mutual authentication protocols for the virtual home environment in 3G mobile network
    Jeong, JM
    Lee, GY
    Lee, Y
    [J]. GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 1658 - 1662
  • [4] A Study on High Security Authentication Mechanism for 3G/WLAN Networks
    Wu, Wei-Chen
    Liaw, Horng-Twu
    [J]. UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 247 - 257
  • [5] Research on Security Authentication Mechanism of Converging WiMAX and 3G Networks
    Wu, Shaobo
    Li, Chengshu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 525 - 528
  • [6] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [7] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [8] VANET authentication protocols: security analysis and a proposal
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (02): : 2153 - 2179
  • [9] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [10] VANET authentication protocols: security analysis and a proposal
    Otto B. Piramuthu
    Matthew Caesar
    [J]. The Journal of Supercomputing, 2023, 79 : 2153 - 2179