Skip to main content

A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy

  • Conference paper
Computational Science and Its Applications – ICCSA 2007 (ICCSA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4706))

Included in the following conference series:

Abstract

In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile Station). However, the UMTS AKA has several drawbacks such as network bandwidth consumption and synchronization problem. In this paper, we propose a new authentication protocol for UMTS that overcomes these problems. Moreover, our protocol enhances the security of the protocol by providing better privacy and also provides perfect forward secrecy. Furthermore, our protocol also provides mutual authentication between an MS and its HN (Home Network) and between an MS and the SN (Serving Network).

This work was supported by the Ministry of Information and Communication, Korea, under the HNRC-ITRC program supervised by the IITA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 33.102, Security Architecture. V7.0.0 (2005)

    Google Scholar 

  2. Zhang, M., Fang, Y.: Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol. IEEE Trans. on Wireless Communications 4(2), 734–742 (2005)

    Article  Google Scholar 

  3. Harn, H., Hsin, W.: On the Security of Wireless Network Access with Enhancements. In: Proc. of the ACM Workshop on Wireless Security, pp. 88–95. ACM Press, New York (2003)

    Chapter  Google Scholar 

  4. Huang, C., Li, J.: Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. In: Proc. of the 19th IEEE Conf. on AINA, pp. 392–397. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  5. Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: Proc. of the ACM Workshop on Wireless Security, pp. 90–97. ACM Press, New York (2004)

    Chapter  Google Scholar 

  6. Kambourakis, G., Roukas, A., Gritzalis, S.: Performance Evaluation of Public key based Authentication in Future Mobile Communication Systems. EURASIP J. on Wireless Communications and Networking 2004(1), 184–197 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, D., Cui, Y., Kim, S., Oh, H. (2007). A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_88

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74477-1_88

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74475-7

  • Online ISBN: 978-3-540-74477-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics