An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks

被引:0
|
作者
Alezabi, Kamal Ali [1 ]
Hashim, Fazirulhisyam [1 ]
Hashim, Shaiful Jahari [1 ]
Ali, Borhanuddin M. [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Dept Comp & Comm Syst Engn, Serdang, Malaysia
关键词
LTE; EPS-AKA; SPEKE; EEPS-AKA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.
引用
收藏
页码:502 / 507
页数:6
相关论文
共 50 条
  • [1] Anonymous Authentication and Key Agreement Protocol for LTE Networks
    Fan, Chun-, I
    Tseng, Yi-Fan
    Cheng, Chen-Hsi
    Kuo, Hsin-Nan
    Huang, Jheng-Jia
    Shih, Yu-Tse
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 68 - 71
  • [2] SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
    Lai, Chengzhe
    Li, Hui
    Lu, Rongxing
    Shen, Xuemin
    COMPUTER NETWORKS, 2013, 57 (17) : 3492 - 3510
  • [3] DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (03) : 2867 - 2899
  • [4] DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks
    Shubham Gupta
    Balu L. Parne
    Narendra S. Chaudhari
    Wireless Personal Communications, 2018, 98 : 2867 - 2899
  • [5] Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks
    Singh, Garima
    Shrimankar, Deepti D.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (02) : 829 - 856
  • [6] Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks
    Garima Singh
    Deepti D. Shrimankar
    Wireless Personal Communications, 2018, 101 : 829 - 856
  • [7] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Wen-lu Zeng
    Wireless Personal Communications, 2013, 70 : 1473 - 1485
  • [8] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Zeng, Wen-lu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1473 - 1485
  • [9] New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile Networks
    Ouaissa, Mariya
    Rhattoy, Abdallah
    Chana, Idriss
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 199 - 204
  • [10] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754