Overview security analysis of 3G authentication protocols and technical specifications

被引:0
|
作者
Cao, Chenlei [1 ,2 ]
Zhang, Ru [1 ,2 ]
Niu, Xinxin [1 ,2 ]
Zhou, Linna [3 ]
Zhang, Zhentao [4 ]
机构
[1] Information Security Centre of State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
[4] National Cyber-Net Security Ltd, Beijing 100088, China
来源
关键词
Public key cryptography - Specifications - Network security - Mobile telecommunication systems;
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mathematical model of the authentication traffic throughput was developed based on the theory of independent and identically distributed probabilities. The research identifies some security vulnerabilities in these protocols, such as the unidirectional process of entity authentication and the unbalanced distribution of authentication traffic, as well as the system complexity. Future development of the 3G security authentication mechanism can be based on IBC (identity-based cryptography) theory.
引用
收藏
页码:2193 / 2199
相关论文
共 50 条
  • [31] MacSim - A framework for MAC and LAC Protocols analysis on 3G mobile communication systems
    Barbosa, LHR
    Mateus, GR
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2002, : 486 - 492
  • [32] Security analysis of two anonymous authentication protocols for distributed wireless networks
    Wong, DS
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
  • [33] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [34] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
  • [35] Limitations of Authentication Test in the Analysis of Multi-party Security Protocols
    Wei-tao, Song
    Bin, Hu
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2243 - 2247
  • [36] Secure 3G user authentication in adhoc serving networks
    Durresi, Arjan
    Evans, Lyn
    Paruchuri, Vamsi
    Barolli, Leonard
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 488 - +
  • [37] Imroved authentication for IMS registration in 3G/WLAN interworking
    Celentano, D.
    Fresa, A.
    Longo, M.
    Robustelli, A. L.
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2794 - +
  • [38] Research on the Authentication Mechanism for 3G Mobile Communication System
    Yang, Yonghui
    Chen, Xuebo
    Gao, Chuang
    Wang, Lidong
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4671 - 4673
  • [39] Biometric-enabled authentication in 3G/WLAN systems
    Dimitriadis, CK
    Polemi, D
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 164 - 167
  • [40] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24