Advertisement

Secure UMTS/EPS Authentication and Key Agreement

  • Jung-Sik ChoEmail author
  • Dongwan Kang
  • Sekwon Kim
  • JooHyoun Oh
  • Cheateae Im
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 179)

Abstract

This paper addresses security vulnerabilities of Universal Mobile Telecommunications System (UMTS) and Evolved Packet System (EPS), mobile cellular technology standards introduced by the 3rd Generation Partnership Project (3GPP). UMTS and EPS secure data confidentiality and signaling data integrity for user equipment (UE) through security architectures and provide security services for mobile communication that is safe from various threats. However, there are security vulnerabilities in the Authentication and Key Agreement(AKA) protocol, one of the security setup processes for UMTS/EPS and UE. Attacker uses these security vulnerabilities and carries out reply attack, man-in-the-middle attack, and DoS attack, etc. This paper proposes a secure AKA protocol that can provide mobile communication that is safe from such threats. Proposed protocol solves the vulnerabilities of AKA protocol. The least amount of modification was made on the existing AKA protocol and we aimed to apply this to UMTS and EPS in practice.

Keywords

UMTS EPS LTE AKA 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    3GPP, 3G security; Security architecture (Release 11), TS 33.102 V11.2.0 (March 2012) Google Scholar
  2. 2.
    3GPP, 3GPP System Architecture Evolution (SAE); Security architecture(Release 11), TS 33.401 V11.3.0 (March 2012) Google Scholar
  3. 3.
    Bais, A., Penzhorn, W.T., Palensky, P.: Evaluation of UMTS security architecture and services. In: 2006 IEEE International Conference on Industrial Informatics, August 16-18, pp. 570–575 (2006)Google Scholar
  4. 4.
    Khan, M., Ahmed, A., Cheema, A.R.: Vulnerabilities of UMTS Access Domain Security Architecture. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2008, August 6-8, pp. 350–355 (2008)Google Scholar
  5. 5.
    Yu, D., Wen, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (ComComAp), January 11-13, pp. 48–53 (2012)Google Scholar
  6. 6.
    Bais, A., Penzhorn, W.T., Palensky, P.: Evaluation of UMTS security architecture and services. In: 2006 IEEE International Conference on Industrial Informatics, August 16-18, pp. 570–575 (2006)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2012

Authors and Affiliations

  • Jung-Sik Cho
    • 1
    Email author
  • Dongwan Kang
    • 1
  • Sekwon Kim
    • 1
  • JooHyoun Oh
    • 1
  • Cheateae Im
    • 1
  1. 1.Korea Internet & Security AgencySeoulKorea

Personalised recommendations