DocumentCode
554336
Title
Research on an improved proposal of 3G security
Author
Li Wang ; Zehua Gao
Author_Institution
Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecom (BUPT), Beijing, China
Volume
8
fYear
2011
fDate
12-14 Aug. 2011
Firstpage
4110
Lastpage
4113
Abstract
In 3G mobile communications, network security is mainly ensured by the AKA protocol and the complexity of encryption algorithms. After successful operation of AKA protocol, the serving network VLR could corroborate the identity of the user and the user could definite the validity of HLR. If authentication is successful, the corresponding cipher key CK and integrity key IK in the authentication vector shall be taken in use to encrypt data in both the RNC and the ME. This paper described the 3G AKA protocol process and its security features, and made an analysis of the potential security vulnerabilities and possible attacks. To solve these vulnerabilities, the author finally put forward a reliable and effective improved proposal. Finally, an analysis of the improved protocol has been made.
Keywords
3G mobile communication; cryptography; protocols; telecommunication network reliability; telecommunication security; 3G mobile communication; AKA protocol process; HLR validity; ME; RNC; VLR serving network; authentication vector; cipher key CK; data encryption; encryption algorithm complexity; integrity key IK; network security; Authentication; Helium; Proposals; Protocols; Public key; AKA Protocol; Communication Security; SG;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on
Conference_Location
Harbin, Heilongjiang
Print_ISBN
978-1-61284-087-1
Type
conf
DOI
10.1109/EMEIT.2011.6023100
Filename
6023100
Link To Document