Qinshu Xiao, Wen’an Zhou, Baojiang Cui, Lingrong Li
{"title":"基于密钥参数加密的LTE/SAE X2切换密钥管理改进","authors":"Qinshu Xiao, Wen’an Zhou, Baojiang Cui, Lingrong Li","doi":"10.1109/3PGCIC.2014.73","DOIUrl":null,"url":null,"abstract":"The security of handover key management in Long Term Evolution (LTE) /System Architecture Evolution (SAE) has been a popular topic in recent years. In this paper we first describe the security architecture and key hierarchy of LTE/SAE, clarifying security requirements of key management in handover. Next, we analyze security of key management in X2 handover (intra-MME handover), and point out the current key management mechanism in X2 handover only satisfy two-hops forward security and one-hop backward security, but not one-hop security. And then, aimed at the security vulnerability of lacking one-hop forward security in current X2 handover key management, we proposed a new scheme for key management in X2 handover based on ciphering some key parameters with the local master root key. At last, the proposed new scheme is analyzed under three adversary models. The analysis shows that one-hop forward security and one-hop backward security could be maintained in our new proposal.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters\",\"authors\":\"Qinshu Xiao, Wen’an Zhou, Baojiang Cui, Lingrong Li\",\"doi\":\"10.1109/3PGCIC.2014.73\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of handover key management in Long Term Evolution (LTE) /System Architecture Evolution (SAE) has been a popular topic in recent years. In this paper we first describe the security architecture and key hierarchy of LTE/SAE, clarifying security requirements of key management in handover. Next, we analyze security of key management in X2 handover (intra-MME handover), and point out the current key management mechanism in X2 handover only satisfy two-hops forward security and one-hop backward security, but not one-hop security. And then, aimed at the security vulnerability of lacking one-hop forward security in current X2 handover key management, we proposed a new scheme for key management in X2 handover based on ciphering some key parameters with the local master root key. At last, the proposed new scheme is analyzed under three adversary models. The analysis shows that one-hop forward security and one-hop backward security could be maintained in our new proposal.\",\"PeriodicalId\":395610,\"journal\":{\"name\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"volume\":\"140 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/3PGCIC.2014.73\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters
The security of handover key management in Long Term Evolution (LTE) /System Architecture Evolution (SAE) has been a popular topic in recent years. In this paper we first describe the security architecture and key hierarchy of LTE/SAE, clarifying security requirements of key management in handover. Next, we analyze security of key management in X2 handover (intra-MME handover), and point out the current key management mechanism in X2 handover only satisfy two-hops forward security and one-hop backward security, but not one-hop security. And then, aimed at the security vulnerability of lacking one-hop forward security in current X2 handover key management, we proposed a new scheme for key management in X2 handover based on ciphering some key parameters with the local master root key. At last, the proposed new scheme is analyzed under three adversary models. The analysis shows that one-hop forward security and one-hop backward security could be maintained in our new proposal.