Provable Secure AKA scheme with reliable key delegation in UMTS

Yu-Lun Huang*, C. Y. Shen, Shiuh-Pyng Shieh, Hung Jui Wang, Cheng Chun Lin

*此作品的通信作者

研究成果: Conference contribution同行評審

14 引文 斯高帕斯(Scopus)

摘要

The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.

原文English
主出版物標題SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement
頁面243-252
頁數10
DOIs
出版狀態Published - 1 12月 2009
事件3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009 - Shanghai, 中國
持續時間: 8 7月 200910 7月 2009

出版系列

名字SSIRI 2009 - 3rd IEEE International Conference on Secure Software Integration Reliability Improvement

Conference

Conference3rd IEEE International Conference on Secure Software Integration Reliability Improvement, SSIRI 2009
國家/地區中國
城市Shanghai
期間8/07/0910/07/09

指紋

深入研究「Provable Secure AKA scheme with reliable key delegation in UMTS」主題。共同形成了獨特的指紋。

引用此