Analytical model for authentication transmission overhead between entities in mobile networks
Computer Communications
A new authentication protocol for UMTS mobile networks
EURASIP Journal on Wireless Communications and Networking
Development of a monitoring and control platform for PLC-based applications
Computer Standards & Interfaces
Mobile services access and payment through reusable tickets
Computer Communications
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
An Extended Authentication and Key Agreement Protocol of UMTS
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
TK-AKA: using temporary key on authentication and key agreement protocol on UMTS
International Journal of Network Management
Secured fast link-layer handover protocols for 3G-WLAN interworking architecture
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
New attacks on UMTS network access
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Kerberos based authentication for inter-domain roaming in wireless heterogeneous network
Computers & Mathematics with Applications
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS
IEEE Communications Letters
Security enhancements against UMTS-GSM interworking attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved delegation-based authentication protocol for secure roaming service with unlinkability
IEEE Communications Letters
A security enhancement and proof for authentication and key agreement (AKA)
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
IEEE Transactions on Wireless Communications
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
An effective AKA protocol for UMTS
International Journal of Mobile Communications
New privacy issues in mobile telephony: fix and verification
Proceedings of the 2012 ACM conference on Computer and communications security
A vulnerability in the UMTS and LTE authentication and key agreement protocols
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Secure data transmission with cloud computing in heterogeneous wireless networks
Security and Communication Networks
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Wireless Personal Communications: An International Journal
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
An enhanced NPA protocol for secure communications in GSM network
International Journal of Security and Networks
Breaking cell phone authentication: vulnerabilities in AKA, IMS and Android
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
SecureSMS: A secure SMS protocol for VAS and other applications
Journal of Systems and Software
Hi-index | 0.01 |
This paper analyzes the authentication and key agreement protocol adopted by Universal Mobile Telecommunication System (UMTS), an emerging standard for third-generation (3G) wireless communications. The protocol, known as 3GPP AKA, is based on the security framework in GSM and provides significant enhancement to address and correct real and perceived weaknesses in GSM and other wireless communication systems. In this paper, we first show that the 3GPP AKA protocol is vulnerable to a variant of the so-called false base station attack. The vulnerability allows an adversary to redirect user traffic from one network to another. It also allows an adversary to use authentication vectors corrupted from one network to impersonate all other networks. Moreover, we demonstrate that the use of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA. To address such security problems in the current 3GPP AKA, we then present a new authentication and key agreement protocol which defeats redirection attack and drastically lowers the impact of network corruption. The protocol, called AP-AKA, also eliminates the need of synchronization between a mobile station and its home network. AP-AKA specifies a sequence of six flows. Dependent on the execution environment, entities in the protocol have the flexibility of adaptively selecting flows for execution, which helps to optimize the efficiency of AP-AKA both in the home network and in foreign networks.