Skip to main content

Deposit-Case Attack Against Secure Roaming

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3574))

Abstract

A secure roaming protocol involves three parties: a roaming user, a visiting foreign server and the user’s home server. The protocol allows the user and the foreign server to establish a session key and carry out mutual authentication with the help of the home server. In the mutual authentication, user authentication is generally done in two steps. First, the user claims that a particular server is his home server. Second, that particular server is called in by the foreign server for providing a ‘credential’ which testifies the user’s claim. We present a new attacking technique which allows a malicious server to modify the user’s claim in the first step without being detected and provide a fake credential to the foreign server in the second step in such a way that the foreign server believes that the malicious server is the user’s home server. We give some examples to explain why it is undesirable in practice if a roaming protocol is vulnerable to this attack. We also show that there are three roaming protocols proposed previously which are vulnerable to this attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On traveling incognito. In: Proc. of the IEEE Workshop on Mobile Systems and Applications (December 1994)

    Google Scholar 

  2. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)

    Google Scholar 

  3. Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes, and Cryptography 2(2), 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  4. Dworkin, M.: Recommendation for Block Cipher Modes of Operation. NIST Special Publication 800-38A 2001 Edition, US Department of Commerce / NIST (December 2001)

    Google Scholar 

  5. Go, J., Kim, K.: Wireless authentication protocol preserving user anonymity. In: Proc. of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), January 2001, pp. 159–164 (2001)

    Google Scholar 

  6. Gollmann, D.: Insider fraud (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 213–219. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  7. Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. on Wireless Communications 2(2), 400–407 (2003)

    Article  MathSciNet  Google Scholar 

  8. Mouly, M., Pautet, M.-B.: The GSM System for Mobile Communications. Published by the authors (1992)

    Google Scholar 

  9. NIST FIPS PUB 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (November 2001)

    Google Scholar 

  10. Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: Proc. of MobiCom 1995, pp. 26–36 (1995)

    Google Scholar 

  11. The Telecommunications Industry Association (TIA). Mobile Station-Base Station Compatibility Standard for Wideband Spread Spectrum Cellular Systems (TIA/EIA-95-B-99) (February 1999)

    Google Scholar 

  12. Varadharajan, V., Mu, Y.: Preserving privacy in mobile communications: A hybrid method. In: IEEE International Conference on Personal Wireless Communications, pp. 532–536 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, G., Wong, D.S., Deng, X. (2005). Deposit-Case Attack Against Secure Roaming. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_35

Download citation

  • DOI: https://doi.org/10.1007/11506157_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26547-4

  • Online ISBN: 978-3-540-31684-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics