Academia.eduAcademia.edu

AI-generated Abstract

The paper addresses the security concerns surrounding the deployment of the LTE-A (4G) network, emphasizing the evolution of mobile technology security from 1G to 4G. It critiques the existing vulnerabilities in earlier generations, particularly focusing on the limitations of GSM and the enhancements introduced by the 3GPP AKA for UMTS and relationship to the LTE security framework. By analyzing past research and proposing an enhanced adaptive security protocol for LTE, the study aims to address known weaknesses and improve authentication processes while maintaining performance amid evolving cryptographic threats.

Key takeaways

  • Vendors can integrate this modules as one device or separately as 3GPP standard demands [9].Part of the LTE security architecture evolution is the EAP AKA Authentication and Key Agreement scheme (LTE-AKA) which defines the protocol through which the User Equipment (UE) and the Home Network (HN) are mutually authenticated and the mechanism through which the master encryption keys are generated.
  • Source: [11] Keys are never reused in LTE AKA.LTE provides integrity, replay protection and encryption between UE and eNB for radio specific signaling.
  • The initialization of SEAP-AKA is aiming at security flaws, this module proposes a Security-Enhanced Authentication and Key Agreement protocol (SE-APA AKA) based on WPKI, using existing 128 bit key encryption as in 3GPP AKA where CA: denotes the Certification Agency; K : denotes the long term key shared between UE and HSS; PK : denotes the public key of UE, MME and HSS; SK: denotes the cipher key of UE, MME and HSS; f 3, f 4, s10 : denotes the key generating functions; ASME K : denotes the intermediate key; ASME KSI : denotes, the key identification allocated by MME for ASME KSI;sig m : denotes the signature to message m.
  • Using the same method, the authentication of MME to UE is also can be validated.
  • To deal with the safety measures problems and supply further development on LTE AKA, we presented a fresh authentication and also key arrangement protocol (SEAP-AKA) which can defeat the redirection strike and drastically mitigates the impact involving network data corruption.