Provable Secure AKA Scheme with Reliable Key Delegation in UNITS

被引:9
|
作者
Huang, Yu-Lun [1 ]
Shen, C. Y. [2 ]
Shieh, Shiuhpyng [2 ]
Wang, Hung-Jui [3 ]
Lin, Cheng-Chun [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Elect Engn, Hsinchu, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[3] Inst Informat Ind, Taipei, Taiwan
关键词
authentication; UNITS AKA; Man-in-the-middle attack; redirection attack;
D O I
10.1109/SSIRI.2009.62
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UNITS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UNITS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UNITS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UNITS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.
引用
收藏
页码:243 / 252
页数:10
相关论文
共 50 条
  • [1] Efficient and provable secure scheme for delegation of signing rights between the groups
    Rajeev Anand Sahu
    Sahadeo Padhye
    Navaneet Ojha
    [J]. annals of telecommunications - annales des télécommunications, 2015, 70 : 369 - 379
  • [2] Efficient and provable secure scheme for delegation of signing rights between the groups
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    Ojha, Navaneet
    [J]. ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 369 - 379
  • [3] A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System
    Chen, Chien-Ming
    Li, Chun-Ta
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    [J]. IEEE ACCESS, 2017, 5 : 3410 - 3422
  • [4] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [5] Provable Secure Group Key Establishment Scheme for Fog Computing
    Chen, Wen-Chin
    Huang, Yin-Tzu
    Wang, Sheng-De
    [J]. IEEE ACCESS, 2021, 9 : 158682 - 158694
  • [6] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [7] A Reliable and Secure Hybrid Key Management Scheme for WSNs
    Tufail, Ali
    Khan, Adil Mehmood
    Kim, Ki-Hyung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (04): : 629 - 642
  • [8] A Note on a Provable Secure Encryption Scheme
    王明强
    秦静
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 655 - 658
  • [9] A note on a provable secure encryption scheme
    Wang M.-Q.
    Qin J.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 655 - 658
  • [10] Provable secure digital watermarking scheme
    Yuan, Zheng
    [J]. Tongxin Xuebao/Journal on Communications, 2008, 29 (09): : 91 - 96