Title :
EC-AKA2 a revolutionary AKA protocol
Author :
Abdo, Jacques Bou ; Demerjian, Jacques ; Chaouchi, Hakima ; Pujolle, Guy
Author_Institution :
Notre Dame Univ., Deir el Qamar, Lebanon
Abstract :
Security is increasingly demanding in mobile communication, especially LTE, and the incremental value of transmitted assets over wireless networks pushes risk way above acceptable thresholds. Decision is continuously moving towards the user side, while the need for seamless security is becoming a must. Under all these requirements, 3GPP failed to propose a new Authentication and Key Agreement Protocol that solves the vulnerabilities found in the current AKA, and implement user preferences in network selection, thus 3GPP failed to meet LTE´s current security needs. This paper proposes a complete AKA protocol that solve four different LTE-AKA weaknesses. The proposed protocol is backward compatible, needs no additional investment and achieves great QoS performance.
Keywords :
3G mobile communication; Long Term Evolution; cryptographic protocols; mobile communication; quality of service; radio networks; telecommunication security; 3GPP; EC-AKA2; LTE current security; LTE-AKA weaknesses; QoS performance; authentication and key agreement protocol; backward compatible; incremental value; investment; mobile communication; network selection; revolutionary AKA protocol; seamless security; transmitted assets; wireless networks; Authentication; Encryption; Long Term Evolution; Protocols; Public key; AKA; IMSI; LTE Security; Mobile security;
Conference_Titel :
Computer Applications Technology (ICCAT), 2013 International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-5284-0
DOI :
10.1109/ICCAT.2013.6521993