Title :
Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony
Author :
Chunyu Tang ; Naumann, David A. ; Wetzel, Susanne
Author_Institution :
Stevens Inst. of Technol., Hoboken, NJ, USA
Abstract :
Second (GSM), third (UMTS), and fourth-generation (LTE) mobile telephony protocols are all in active use, giving rise to a number of interoperation situations. Although the standards address roaming by specifying switching and mapping of established security context, there is not a comprehensive specification of which are the possible interoperation cases. Nor is there comprehensive specification of the procedures to establish security context (authentication and short-term keys) in the various interoperation scenarios. This paper systematically enumerates the cases, classifying them as allowed, disallowed, or uncertain with rationale based on detailed analysis of the specifications. We identify the authentication and key agreement procedure for each of the possible cases. We formally model these scenarios and analyze their security, in the symbolic model, using the tool Prove if. We find two scenarios that inherit a known false base station attack. We find an attack on the CMC message of another scenario.
Keywords :
3G mobile communication; 4G mobile communication; Long Term Evolution; cellular radio; cryptographic protocols; telecommunication security; 3G mobile communication; 4G mobile communication; AKA; CMC message; GSM; LTE; Long Term Evolution; ProVerif tool; UMTS; authentication-key establishment; base station attack; mobile telephony protocols; symbolic model; 3G mobile communication; Authentication; Context; GSM; Protocols; Vectors;
Conference_Titel :
High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on
Conference_Location :
Zhangjiajie
DOI :
10.1109/HPCC.and.EUC.2013.226