An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks

被引:0
|
作者
Alezabi, Kamal Ali [1 ]
Hashim, Fazirulhisyam [1 ]
Hashim, Shaiful Jahari [1 ]
Ali, Borhanuddin M. [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Dept Comp & Comm Syst Engn, Serdang, Malaysia
关键词
LTE; EPS-AKA; SPEKE; EEPS-AKA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.
引用
收藏
页码:502 / 507
页数:6
相关论文
共 50 条
  • [21] Temporary Internet Access for Authentication and Key Agreement for LTE Networks
    Li, Xue Jun
    Ma, Maode
    Xie, Jiecheng
    SMART GRID AND INNOVATIVE FRONTIERS IN TELECOMMUNICATIONS, SMARTGIFT 2018, 2018, 245 : 1 - 10
  • [22] GAKAV: Group Authentication and Key Agreement for LTE/LTE-A Vehicular Networks
    Xu, Cheng
    Huang, Xiaohong
    Ma, Maode
    Bao, Hong
    2017 19TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS (HPCC) / 2017 15TH IEEE INTERNATIONAL CONFERENCE ON SMART CITY (SMARTCITY) / 2017 3RD IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (DSS), 2017, : 412 - 418
  • [23] The Analysis of Key Performance Indicators (KPI) in 4G/LTE Networks
    Krasniqi, Fidel
    Gavrilovska, Liljana
    Maraj, Arianit
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, FABULOUS 2019, 2019, 283 : 285 - 296
  • [24] An Efficient Authentication and Key Agreement Protocol in RFID System
    Yoon, Eun-Jun
    Yoo, Kee-Young
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 320 - +
  • [25] Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks
    Maghrebi, Houssem
    Bringer, Julien
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2016, 2017, 10146 : 39 - 56
  • [26] Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network
    Li Xiehua
    Wang Yongjun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [27] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Neetesh Saxena
    Jaya Thomas
    Narendra S. Chaudhari
    Wireless Personal Communications, 2015, 84 : 1981 - 2012
  • [28] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [29] ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
    Saxena, Neetesh
    Thomas, Jaya
    Chaudhari, Narendra S.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1981 - 2012
  • [30] Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme
    Mathi, Senthilkumar
    Dharuman, Lavanya
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 170 - 179