Provable Secure AKA Scheme with Reliable Key Delegation in UNITS

被引:9
|
作者
Huang, Yu-Lun [1 ]
Shen, C. Y. [2 ]
Shieh, Shiuhpyng [2 ]
Wang, Hung-Jui [3 ]
Lin, Cheng-Chun [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Elect Engn, Hsinchu, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[3] Inst Informat Ind, Taipei, Taiwan
关键词
authentication; UNITS AKA; Man-in-the-middle attack; redirection attack;
D O I
10.1109/SSIRI.2009.62
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UNITS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UNITS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UNITS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UNITS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.
引用
收藏
页码:243 / 252
页数:10
相关论文
共 50 条
  • [31] BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management
    Zhang, Guipeng
    Xie, Haoran
    Yang, Zhenguo
    Tao, Xiaohui
    Liu, Wenyin
    [J]. NEURAL PROCESSING LETTERS, 2022, 54 (04) : 2657 - 2674
  • [32] Comments on a Secure AKA Scheme for Multi-server Environments
    Meng, Qian
    Lee, Zhiyuan
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Lu, Kuan-Han
    [J]. ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 391 - 397
  • [33] An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2532 - 2553
  • [34] Provable secure proxy signature scheme without bilinear pairings
    Tiwari, Namita
    Padhye, Sahadeo
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 644 - 650
  • [35] Reliable cascaded delegation scheme for mobile agent environments
    Lee, HS
    Kwon, HM
    Eom, YI
    [J]. INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 55 - 68
  • [36] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [37] Cryptanalysis of a forward secure blind signature scheme with provable security
    Wang, SH
    Bao, F
    Deng, RH
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 53 - 60
  • [38] A provable secure pairing-free certificateless identification scheme
    Chin, Ji-Jian
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Phan, Raphael C-W
    Behnia, Rouzbeh
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (08) : 1520 - 1535
  • [39] Authenticated Key Exchange Protocols Based on Provable Secure Attribute
    Xia, Hui
    Liu, Jie
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
  • [40] A provable secure key management program for wireless sensor network
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 662 - +