Title :
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS
Author :
Huang, Yu-Lun ; Shen, C.Y. ; Shieh, Shiuhpyng ; Wang, Hung-Jui ; Lin, Cheng-Chun
Author_Institution :
Dept of Electr. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
The authentication key agreement scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new secure authentication key agreement protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.
Keywords :
3G mobile communication; cellular radio; protocols; telecommunication security; GSM; UMTS; Universal Mobile Telecommunication System; authentication key agreement; authentication messages; bandwidth consumption; man-in-the-middle attack; provable secure AKA scheme; redirection attack; reliable key delegation; roaming attack; secure authentication key agreement protocol; sequence number depletion; wireless communication systems; 3G mobile communication; Authentication; Bandwidth; Communication system security; GSM; Protocols; Redundancy; Resists; Roaming; Wireless communication; Man-in-the-middle attack; UMTS AKA; authentication; redirection attack;
Conference_Titel :
Secure Software Integration and Reliability Improvement, 2009. SSIRI 2009. Third IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3758-0
DOI :
10.1109/SSIRI.2009.62