A Forward Secure PKI-based UMTS-AKA with Tunneling Authentication

被引:0
|
作者
Aminmoghadam, Emad [1 ]
Mirghadri, Abdolrasol [2 ]
机构
[1] DSP Res Inst, Tehran, Iran
[2] Imam Hossein Univ, Tehran, Iran
关键词
UMTS; TTLS; Forward secrecy; Online-certificate validation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During development of the UMTS security standard, many protocols have been proposed to secure the UMTS AKA. Although these efforts have been too much until now, but new protocols are also vulnerable or are not suitable for a mobile environment, in which the computational capabilities of handsets are restricted. In this paper we propose a new protocol based on tunneling authentication. Our focus is not on the 3G network itself, but on the way of Public Key Infrastructure(PKI) deployment in cellular networks. Therefore, this scheme can be extended to other networks like 4G. We have combined the features of PKI with concept of Tunneled TLS(TTLS), where there is no need to issue a certificate for each mobile user and creating a tunnel causes a robust key agreement. In our scheme there is no need to involve mobile handset in the process of certificate path validation and we have used a new method for this purpose called efficient online-validation method. Furthermore, due to our intention for reducing changes in the 3GPP standard we still use the idea of Authentication Vector which facilitates our protocol implementation. Also user identity confidentiality is protected by using public-key encryption. Finally, the proposed protocol has the property of forward secrecy, where compromising the Master Key, does not result on insecurity of past sessions.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 26 条
  • [1] PKI-Based authentication mechanisms in grid systems
    Zhao, Shushan
    Aggarwal, Akshai
    Kent, Robert D.
    [J]. INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 83 - +
  • [2] A PKI-based secure audit web service
    Xu, Wensheng
    Chadwick, David
    Otenko, Sassa
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 106 - 110
  • [3] A PKI-based cross heterogeneous domain authentication model
    Yao, Yao
    Wang, Xing-Wei
    Jiang, Ding-De
    Zhou, Fu-Cai
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2011, 32 (05): : 638 - 641
  • [4] Offline Access to a Vehicle via PKI-Based Authentication
    Arm, Jakub
    Fiedler, Petr
    Bastan, Ondrej
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2021), 2021, 12853 : 76 - 88
  • [5] Mobile PKI: A PKI-based authentication ftamework for the next generation mobile communications
    Gu, JB
    Park, S
    Song, O
    Lee, J
    Nah, JH
    Sohn, SW
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 180 - 191
  • [6] A PKI-based authentication framework next generation mobile Internet
    Gu, J
    Park, S
    Song, O
    Lee, J
    [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 34 - 43
  • [7] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    [J]. Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [8] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [9] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012
  • [10] PKI-Based Cryptography for Secure Cloud Data Storage Using ECC
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Young Sil
    Lee, Hoon Jae
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 194 - 199