Title :
Research on an improved proposal of 3G security
Author :
Li Wang ; Zehua Gao
Author_Institution :
Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecom (BUPT), Beijing, China
Abstract :
In 3G mobile communications, network security is mainly ensured by the AKA protocol and the complexity of encryption algorithms. After successful operation of AKA protocol, the serving network VLR could corroborate the identity of the user and the user could definite the validity of HLR. If authentication is successful, the corresponding cipher key CK and integrity key IK in the authentication vector shall be taken in use to encrypt data in both the RNC and the ME. This paper described the 3G AKA protocol process and its security features, and made an analysis of the potential security vulnerabilities and possible attacks. To solve these vulnerabilities, the author finally put forward a reliable and effective improved proposal. Finally, an analysis of the improved protocol has been made.
Keywords :
3G mobile communication; cryptography; protocols; telecommunication network reliability; telecommunication security; 3G mobile communication; AKA protocol process; HLR validity; ME; RNC; VLR serving network; authentication vector; cipher key CK; data encryption; encryption algorithm complexity; integrity key IK; network security; Authentication; Helium; Proposals; Protocols; Public key; AKA Protocol; Communication Security; SG;
Conference_Titel :
Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on
Conference_Location :
Harbin, Heilongjiang
Print_ISBN :
978-1-61284-087-1
DOI :
10.1109/EMEIT.2011.6023100