Title :
An efficient authentication and key agreement protocol for 4G (LTE) networks
Author :
Alezabi, Kamal Ali ; Hashim, Fazirulhisyam ; Hashim, Shaiful Jahari ; Ali, Borhanuddin M.
Author_Institution :
Dept. of Comp. & Comm. Syst. Eng., Univ. Putra Malaysia, Serdang, Malaysia
Abstract :
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.
Keywords :
4G mobile communication; Internet; Long Term Evolution; cryptographic protocols; formal verification; 3GPP; 3rd generation partnership project; 4G network; AVISPA; EAP-AKA; EEPS-AKA; HSS; Internet application; LTE network; Long Term Evolution; MITM attack; SPEKE protocol; UE; authentication delay; automated validation of Internet security protocols and applications; certificate-based method; data communication; data transmission; efficient evolved packet system AKA; extensible authentication protocol-authentication and key agreement; formal verification; home subscriber server; man in the middle attack; network service; scalable bandwidth; simple password exponential key exchange; user equipment; video transmission; Authentication; Cryptography; Delays; Handover; Long Term Evolution; Protocols; EEPS-AKA; LTE EPS-AKA; SPEKE;
Conference_Titel :
Region 10 Symposium, 2014 IEEE
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4799-2028-0
DOI :
10.1109/TENCONSpring.2014.6863085