Abstract
In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile Station). However, the UMTS AKA has several drawbacks such as network bandwidth consumption and synchronization problem. In this paper, we propose a new authentication protocol for UMTS that overcomes these problems. Moreover, our protocol enhances the security of the protocol by providing better privacy and also provides perfect forward secrecy. Furthermore, our protocol also provides mutual authentication between an MS and its HN (Home Network) and between an MS and the SN (Serving Network).
This work was supported by the Ministry of Information and Communication, Korea, under the HNRC-ITRC program supervised by the IITA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP TS 33.102, Security Architecture. V7.0.0 (2005)
Zhang, M., Fang, Y.: Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol. IEEE Trans. on Wireless Communications 4(2), 734–742 (2005)
Harn, H., Hsin, W.: On the Security of Wireless Network Access with Enhancements. In: Proc. of the ACM Workshop on Wireless Security, pp. 88–95. ACM Press, New York (2003)
Huang, C., Li, J.: Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. In: Proc. of the 19th IEEE Conf. on AINA, pp. 392–397. IEEE Computer Society Press, Los Alamitos (2005)
Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: Proc. of the ACM Workshop on Wireless Security, pp. 90–97. ACM Press, New York (2004)
Kambourakis, G., Roukas, A., Gritzalis, S.: Performance Evaluation of Public key based Authentication in Future Mobile Communication Systems. EURASIP J. on Wireless Communications and Networking 2004(1), 184–197 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, D., Cui, Y., Kim, S., Oh, H. (2007). A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_88
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)