Yu-Lun Huang, Chih-Ya Shen, S. Shieh, Hung-Jui Wang, Cheng-Chun Lin
{"title":"UMTS中具有可靠密钥委托的可证明安全AKA方案","authors":"Yu-Lun Huang, Chih-Ya Shen, S. Shieh, Hung-Jui Wang, Cheng-Chun Lin","doi":"10.1109/SSIRI.2009.62","DOIUrl":null,"url":null,"abstract":"The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Provable Secure AKA Scheme with Reliable Key Delegation in UMTS\",\"authors\":\"Yu-Lun Huang, Chih-Ya Shen, S. Shieh, Hung-Jui Wang, Cheng-Chun Lin\",\"doi\":\"10.1109/SSIRI.2009.62\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.\",\"PeriodicalId\":196276,\"journal\":{\"name\":\"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement\",\"volume\":\"181 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSIRI.2009.62\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSIRI.2009.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS
The Authentication Key Agreement Scheme (AKA) of Universal Mobile Telecommunication System (UMTS) provides substantial enhancement to solve the vulnerabilities in GSM and other wireless communication systems. However, we discovered four security weaknesses of UMTS AKA, that is, redirection attack, man-in-the-middle attack, sequence number depletion, and roaming attack. An adversary can launch these attacks to eavesdrop, or cause billing problems. To cope with these problems, a new Secure Authentication Key Agreement Protocol (S-AKA) is proposed in this paper to enhance the security to resist the attacks. To improve the efficiency and redundancy of UMTS AKA, S-AKA reduces both the authentication messages and bandwidth consumption of UMTS AKA. The formal proof of S-AKA is also given to ensure the security strength of S-AKA.