Security analysis and enhancements of 3GPP authentication and key agreement protocol

被引:123
|
作者
Zhang, MX [1 ]
Fang, YG
机构
[1] Verizon Commun Inc, Waltham, MA 02451 USA
[2] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
authentication; privacy; security; third generation (3G); wireless;
D O I
10.1109/TWC.2004.842941
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides significant enhancement to address and correct real and perceived weaknesses in GSM and other wireless communication systems. In this paper, we first show that the 3GPP AKA protocol is vulnerable to a variant of the so-called false base station attack. The vulnerability allows an adversary to redirect user traffic from one network to another. It also allows an adversary to use authentication vectors corrupted from one network to impersonate all other networks. Moreover, we demonstrate that the use of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA. To address such security problems in the current 3GPP AKA, we then present a new authentication and key agreement protocol which defeats redirection attack and drastically lowers the impact of network corruption. The protocol, called AP-AKA, also eliminates the need of synchronization between a mobile station and its home network. AP-AKA specifies a sequence of six flows. Dependent on the execution environment, entities in the protocol have the flexibility of adaptively selecting flows for execution, which helps to optimize the efficiency of AP-AKA both in the home network and in foreign networks.
引用
收藏
页码:734 / 742
页数:9
相关论文
共 50 条
  • [31] Analysis of Authentication traffic in next generation 3GPP LTE Networks
    Purkhiabani, Masoumeh
    Salahi, Ahmad
    Nejati, Mansour
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [32] Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
    Mohammad Sabzinejad Farash
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 82 - 91
  • [34] Efficient 3 GPP authentication and key agreement with robust user privacy protection
    Juang, Wen-Senq
    Wu, Jing-Lin
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2722 - 2727
  • [35] Research on 3GPP LTE Security Architecture
    Zhu, Li
    Qin, Hang
    Mao, Huaqing
    Hu, Zhiwen
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [36] Security enhanced authentication and key agreement protocol in next generation mobile network
    Xiehua, Li
    Yongjun, Wang
    [J]. Xiehua, L. (lixiehua7899@sina.com), 2012, Advanced Institute of Convergence Information Technology (04) : 215 - 222
  • [37] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    [J]. FUTURE INTERNET, 2024, 16 (01)
  • [38] Performance and security enhanced authentication and key agreement protocol for SAE/LTE network
    Degefa, Fikadu B.
    Lee, Donghoon
    Kim, Jiye
    Choi, Younsung
    Won, Dongho
    [J]. COMPUTER NETWORKS, 2016, 94 : 145 - 163
  • [39] An improved Authentication and Key Agreement Protocol of 3G
    Zheng, Xiankun
    Liu, Changjiang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 733 - 737
  • [40] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    [J]. JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92