SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks

Balu L. Parne, Shubham Gupta, N. Chaudhari
{"title":"SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks","authors":"Balu L. Parne, Shubham Gupta, N. Chaudhari","doi":"10.1109/RAIT.2018.8389062","DOIUrl":null,"url":null,"abstract":"The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.
SEACE:用于UMTS网络的安全增强和计算效率高的AKA协议
通用移动通信系统(UMTS)的提出是为了避免全球移动通信系统(GSM)在应用中存在的弱点。UMTS认证和密钥协议(AKA)协议是第一个提出的用于认证UMTS网络中通信实体的协议。该协议满足了相互认证、完整性和机密性等安全需求。然而,现有的UMTS- aka协议容易受到网络漏洞的影响,从而导致对UMTS网络的冒充、拒绝服务、中间人和身份捕捉攻击。针对UMTS-AKA的这些先天漏洞,研究人员提出了几种AKA协议,但这些协议都未能克服所有的安全弱点。此外,现有的UMTS-AKA协议都没有克服单密钥暴露问题。为了克服这些问题,我们为UMTS网络引入了安全增强和计算效率(SEACE)协议。该协议保护了密钥管理系统的隐私性,解决了密钥暴露问题,避免了通信网络中所有可识别的攻击。使用互联网安全协议和应用程序自动验证(AVISPA)工具对SEACE-AKA协议进行安全性分析。分析表明,该协议达到了安全目标,能够抵御各种已知的攻击。与现有的AKA协议进行性能分析表明,SEACE-AKA协议产生的开销较小,能够满足UMTS网络的所有安全要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信