{"title":"基于重定向防御的改进EAP-AKA协议","authors":"Binbin Yu, Jianwu Zhang, Zhendong Wu","doi":"10.1109/3PGCIC.2014.106","DOIUrl":null,"url":null,"abstract":"With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Improved EAP-AKA Protocol Based on Redirection Defense\",\"authors\":\"Binbin Yu, Jianwu Zhang, Zhendong Wu\",\"doi\":\"10.1109/3PGCIC.2014.106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.\",\"PeriodicalId\":395610,\"journal\":{\"name\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2014.106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved EAP-AKA Protocol Based on Redirection Defense
With the substantial popularity of smartphones and the increasing development of wireless technology, users have higher and higher demands for seamless data connection, which involves the vertical handover and unified authentication between heterogeneous networks. 3G-WLAN network is the most widely studied and used scheme which uses EAP-AKA protocol as its authentication protocol. However, EAP-AKA protocol contains a number of security vulnerabilities of AKA. The most serious problem of them is the complete trust in APs. This paper analyzes the security flaws of EAP-AKA protocol, and presents a kind of redirection attack based on the complete trust in APs, and then simulates it. Finally we propose an improved EAP-AKA protocol to prevent redirection attack.