DocumentCode :
3740354
Title :
LTE Authentication Protocol (EPS-AKA) weaknesses solution
Author :
Mohammed Aly Abdrabou;Ashraf Diaa Eldien Elbayoumy;Essam Abd El-Wanis
Author_Institution :
Dept. of Communication, Military Technical College, Cairo, Egypt
fYear :
2015
Firstpage :
434
Lastpage :
441
Abstract :
Extensible Authentication Protocol (EAP) is an authentication framework in Long Term Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the Authentication and Key Agreement (AKA) mechanism based on challenge-response mechanisms, EAP-AKA is used in the 3rd generation mobile networks then modified and inherited to 4th generation mobile networks (LTE) as Evolved Packet System Authentication and Key Agreement (EPS-AKA) mechanism which is used when the user access the network through EUTRAN. EPS-AKA vulnerabilities are disclosure of the user identity, Man in the Middle attack and Denial of Services (DoS) attacks so a robust authentication mechanism must replace EPSAKA to avoid such attacks. In this paper, Modified Evolved Packet System Authentication and Key Agreement (MEPS-AKA) protocol based on Simple Password Exponential Key Exchange (SPEKE) and symmetric key cryptography is proposed to solve these problems by performing a pre-authentication procedure to generate a dynamic key every time user access to the network, also each message send or received is confidentially protected. Scyther tool is used to verify the efficiency of the proposed protocol. EPS-AKA and MEPS-AKA are simulated using C programming language to calculate the execution time for both algorithms. The proposed protocol is simulated using a client-server application program using C# programming language.
Keywords :
"Protocols","Long Term Evolution","Redundancy"
Publisher :
ieee
Conference_Titel :
Intelligent Computing and Information Systems (ICICIS), 2015 IEEE Seventh International Conference on
Print_ISBN :
978-1-5090-1949-6
Type :
conf
DOI :
10.1109/IntelCIS.2015.7397256
Filename :
7397256
Link To Document :
بازگشت