Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
11 pages
1 file
The paper addresses the security concerns surrounding the deployment of the LTE-A (4G) network, emphasizing the evolution of mobile technology security from 1G to 4G. It critiques the existing vulnerabilities in earlier generations, particularly focusing on the limitations of GSM and the enhancements introduced by the 3GPP AKA for UMTS and relationship to the LTE security framework. By analyzing past research and proposing an enhanced adaptive security protocol for LTE, the study aims to address known weaknesses and improve authentication processes while maintaining performance amid evolving cryptographic threats.
The 3 rd Generation Partnership (3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next generation mobile communication system. In the LTE/SAE architecture, EPS AKA(Evolved Packet System Authentication and Key Agreement) procedure is used to provide mutual authentication between the user and the network. However the EPS AKA has several vulnerabilities such as disclosure of user identity, man-inmiddle attack, etc. Therefore, this paper analyzes the deficiencies of the EPS AKA, and proposes a Security Enhanced Authentication and Key agreement (SE-EPS AKA) based on Wireless Public Key Infrastructure (WPKI). Then, the new SE-EPS AKA has been proved with the formal verification method, and the proof result shows that the SE-EPS AKA can satisfy the security and efficiency propoerties in the LTE/SAE architecture.
ipcsit.com
Abstract. The 3rd Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next generation mobile communication system. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible ...
International Journal of Computer Applications, 2013
New cellular networks are capable of providing high mobility, whereas WLANs are known for having relatively higher bandwidths. Therefore, interworking cellular networks with WLANs offers ubiquitous data services and relatively high data rates across modern networks. This interworking will enable a user to access new cellular services via a WLAN, while roaming within a range of hotspots. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities. This paper analyzes vulnerabilities in LTE-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA.
Femtocells are used to enhance the service coverage inside the office or home, particularly where access is narrow or engaged. Femtocells enhance the service quality that is attractive for the client and the mobile operator. Currently, security of core network from the unauthorized user in public environment is a big issue and there is no integrated solution to verify a rouge femtocell or unauthorized user equipment (UE). Forged equipment can launch any attack or hack the core network to act actively or passively. Hence, there is a need for a mutual authentication protocol, so communication equipments can verify each other during connection establishment and make a secure tunnel for communication. In this paper we have critically analyzed the Rapid Development Authentication Protocol (RDAP) and its structural design. Then a novel protocol has been proposed which provide mutual authentication between User Equipment (UE) and femtocell that will make the system more secure than conventional RDAP. Moreover, novel scheme is also compatible with the current network architecture and resist various network attacks e.g., Sybil attack, MITM, DOS, Eavesdropping & Injecting attack and Packet Sniffing.
Eighth International Conference on Digital Information Management (ICDIM 2013), 2013
In this paper we discuss about security which is the main element in the wireless communication. As the generation changes many steps are used to improve the security so in this we discuss many security techniques choose, implement and compare two of them which provide better security to customers in LTE Advanced. LTE Advanced is evolved and advanced version of LTE (Long Term Evolution) which is developed by 3GPP. We implement the security techniques which we can use in LTE Advanced. To secure our data we use security algorithms (KASUMI & TDES) which have two parts encryption and decryption. In encryption process we convert our original data in cipher text by using keys and then transmit this encrypted data to the receiver. And at the receiving end we decrypt the encrypted data with the same keys to recover the original data. KASUMI Algorithm is a block cipher that produces a 64-bit output from 64-bit input under the control of a 128-key and three functions. It has 8 rounds. TDES Algorithm is a block cipher that produces a 64-bit output from a 64-bit input under the control of three keys of 64-bits with a function. It has 16 rounds. We implement these techniques in Matlab for verifying our results, and then we conclude that both algorithms are efficient for security purposes, so that no one can crack our data.
In this paper, we propose a secure authentication of the Evolved Packet System Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is proposed to solve the problem of sending the IMSI as a clear text, and hence prevents the mobility management entity attack. We will use public key (PK) cryptography to protect the transmitted messages, the RSA scheme computation to compute a temporary value to the IMSI, and nonce to generate challenge messages toward the opposite side. Our scheme does not need to change the original framework and the infrastructure of the LTE-A network, although a ciphered IMSI is transmitted. The authentication procedure is performed by the HSS to authenticate the UEs and the MME; therefore, the impersonating of the MME and UEs is not possible. Our evaluation demonstrates that the proposed scheme is secure and achieves the security requirements of the LTE-A subscribers such as privacy, authentication, confidentiality and integrity. In our scheme, we try to maintain the problems defined in the previous related works.
2009 Wireless Telecommunications Symposium, 2009
The 3rd Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE)/Long Term Evolution(LTE) architecture for the next generation mobile communication system. The SAE/LTE architecture provides secure service and 3G-WLAN interworking [9]. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement(EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-themiddle attack, Sequence Number(SQN) synchronization, and additional bandwidth consumption. Therefore, this paper analyzes threats and attacks in 3G-WLAN interworking and proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines Elliptic Curve Diffie-Hellman(ECDH) with symmetric key cryptosystem to overcome these vulnerabilities. Moreover, our protocol provides Perfect Forward Secrecy(PFS) to guarantee stronger security, mutual authentication, and resistance to replay attack. Compared with previous protocols which use public key cryptosystem with certificates, our protocol can reduce computational overhead.
IEEE Access, 2019
The wireless technology has revolutionized and had a significant impact on every aspect of people's life. Confidential information, financial transactions, and sensitive conversations are frequent via the wireless network and securing all these data are of the utmost importance. In this paper, we discuss the major weaknesses of the long-term evolution (LTE) authentication process and propose a new approach-the hybrid evolved packet system (HEPS) protocol to address the vulnerabilities. The proposed protocol has been verified logically, using Burrows-Abadi-Needham logic, and systematically, using the automated validation of internet security protocol and application tool. The HEPS protocol will optimize the performance of the LTE authentication process and fundamentally solve the security issue of the process. INDEX TERMS Long term evolution, hybrid evolved packet system, Burrows-Abadi-Needham logic, automated validation of Internet security protocol, application tool.
Lecture Notes in Computer Science, 2016
Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms called MILENAGE; as an alternative, the ETSI SAGE committee submitted the TUAK algorithms, which rely on a truncation of the internal permutation of Keccak. In this paper, we provide a formal security analysis of the AKA protocol in its complete three-party setting. We formulate requirements with respect to both Man-in-the-Middle (MiM) adversaries, i.e. keyindistinguishability and impersonation security, and to local untrusted serving networks, denoted "servers", namely state-confidentiality and soundness. We prove that the unmodified AKA protocol attains these properties as long as servers cannot be corrupted. Furthermore, adding a unique server identifier suffices to guarantee all the security statements even in in the presence of corrupted servers. We use a modular proof approach: the first step is to prove the security of (modified and unmodified) AKA with generic cryptographic algorithms that can be represented as a unitary pseudorandom function-PRF-keyed either with the client's secret key or with the operator key. A second step proceeds to show that TUAK and MILENAGE guarantee this type of pseudorandomness, though the guarantee for MILENAGE requires a stronger assumption. Our paper provides (to our knowledge) the first complete, rigorous analysis of the original AKA protocol and these two instantiations. We stress that such an analysis is important for any protocol deployed in real-life scenarios.
The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the longterm evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the object's (user/device) identity and key set identifier in plaintext over the network, synchronization, large overhead, limited identity privacy, and security attack vulnerabilities. In this article, we propose a new secure and efficient AKA protocol for the LTE network that supports secure and efficient communications among various IoT devices as well as among the users. Analysis shows that our protocol is secure, efficient, and privacy preserved, and reduces bandwidth consumption during authentication.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Int. J. Netw. Secur., 2016
Peer-to-Peer Networking and Applications, 2018
Signals and Communication Technology, 2007
Wireless Personal Communications, 2014
Communications on Applied Electronics, 2019
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018
The International Conference on Electrical Engineering
… robotics and automation, and 3rd WSEAS …, 2011
IEEE Transactions on Industrial Informatics, 2018
IEEE Access
The Journal of China Universities of Posts and Telecommunications, 2013