{"title":"SEACE:用于UMTS网络的安全增强和计算效率高的AKA协议","authors":"Balu L. Parne, Shubham Gupta, N. Chaudhari","doi":"10.1109/RAIT.2018.8389062","DOIUrl":null,"url":null,"abstract":"The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks\",\"authors\":\"Balu L. Parne, Shubham Gupta, N. Chaudhari\",\"doi\":\"10.1109/RAIT.2018.8389062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.\",\"PeriodicalId\":219972,\"journal\":{\"name\":\"2018 4th International Conference on Recent Advances in Information Technology (RAIT)\",\"volume\":\"123 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 4th International Conference on Recent Advances in Information Technology (RAIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RAIT.2018.8389062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2018.8389062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks
The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.