An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks

被引:0
|
作者
Alezabi, Kamal Ali [1 ]
Hashim, Fazirulhisyam [1 ]
Hashim, Shaiful Jahari [1 ]
Ali, Borhanuddin M. [1 ]
机构
[1] Univ Putra Malaysia, Fac Engn, Dept Comp & Comm Syst Engn, Serdang, Malaysia
关键词
LTE; EPS-AKA; SPEKE; EEPS-AKA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.
引用
收藏
页码:502 / 507
页数:6
相关论文
共 50 条
  • [31] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [32] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful J.
    Ali, Borhanuddin M.
    Jamalipour, Abbas
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [33] A Group-based Authentication and Key Agreement for MTC in LTE Networks
    Cao, Jin
    Ma, Maode
    Li, Hui
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1017 - 1022
  • [34] A GAA-based batch authentication and key agreement for LTE networks
    Zhang, Wujun
    Wang, Xiaohui
    Zhou, Yunya
    Deng, Hua
    Wang, Yumin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 289 - 295
  • [35] PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
    Balu L. Parne
    Shubham Gupta
    Narendra S. Chaudhari
    Peer-to-Peer Networking and Applications, 2019, 12 : 1156 - 1177
  • [36] Security Analysis of Handover Key Management in 4G LTE/SAE Networks
    Han, Chan-Kyu
    Choi, Hyoung-Kee
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (02) : 457 - 468
  • [37] Performance Analysis of the Key Aspects Affecting Capacity of 4G LTE Networks
    Kim, Igor
    Um, Jungsun
    Park, Seungkeun
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 769 - 771
  • [38] PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1156 - 1177
  • [39] An improved Authentication and Key Agreement Protocol of 3G
    Zheng, Xiankun
    Liu, Changjiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 733 - 737
  • [40] A Beyond-5G Authentication and Key Agreement Protocol
    Damir, Mohamed Taoufiq
    Meskanen, Tommi
    Ramezanian, Sara
    Niemi, Valtteri
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 249 - 264