TY - GEN
T1 - Provable Secure AKA scheme with reliable key delegation in UMTS
AU - Huang, Yu-Lun
AU - Shen, C. Y.
AU - Shieh, Shiuh-Pyng
AU - Wang, Hung Jui
AU - Lin, Cheng Chun
PY - 2009/12/1
Y1 - 2009/12/1
N2 - The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.
AB - The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.
KW - Authentication
KW - Man-in-the-middle attack
KW - Redirection attack
KW - UMTS AKA
UR - http://www.scopus.com/inward/record.url?scp=72849108806&partnerID=8YFLogxK
U2 - 10.1109/SSIRI.2009.62
DO - 10.1109/SSIRI.2009.62
M3 - Conference contribution
AN - SCOPUS:72849108806
SN - 9780769537580
T3 - SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement
SP - 243
EP - 252
BT - SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement
T2 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009
Y2 - 8 July 2009 through 10 July 2009
ER -