Abstract
This paper addresses security vulnerabilities of Universal Mobile Telecommunications System (UMTS) and Evolved Packet System (EPS), mobile cellular technology standards introduced by the 3rd Generation Partnership Project (3GPP). UMTS and EPS secure data confidentiality and signaling data integrity for user equipment (UE) through security architectures and provide security services for mobile communication that is safe from various threats. However, there are security vulnerabilities in the Authentication and Key Agreement(AKA) protocol, one of the security setup processes for UMTS/EPS and UE. Attacker uses these security vulnerabilities and carries out reply attack, man-in-the-middle attack, and DoS attack, etc. This paper proposes a secure AKA protocol that can provide mobile communication that is safe from such threats. Proposed protocol solves the vulnerabilities of AKA protocol. The least amount of modification was made on the existing AKA protocol and we aimed to apply this to UMTS and EPS in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP, 3G security; Security architecture (Release 11), TS 33.102 V11.2.0 (March 2012)
3GPP, 3GPP System Architecture Evolution (SAE); Security architecture(Release 11), TS 33.401 V11.3.0 (March 2012)
Bais, A., Penzhorn, W.T., Palensky, P.: Evaluation of UMTS security architecture and services. In: 2006 IEEE International Conference on Industrial Informatics, August 16-18, pp. 570–575 (2006)
Khan, M., Ahmed, A., Cheema, A.R.: Vulnerabilities of UMTS Access Domain Security Architecture. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2008, August 6-8, pp. 350–355 (2008)
Yu, D., Wen, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (ComComAp), January 11-13, pp. 48–53 (2012)
Bais, A., Penzhorn, W.T., Palensky, P.: Evaluation of UMTS security architecture and services. In: 2006 IEEE International Conference on Industrial Informatics, August 16-18, pp. 570–575 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Cho, JS., Kang, D., Kim, S., Oh, J., Im, C. (2012). Secure UMTS/EPS Authentication and Key Agreement. In: Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 179. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5064-7_11
Download citation
DOI: https://doi.org/10.1007/978-94-007-5064-7_11
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5063-0
Online ISBN: 978-94-007-5064-7
eBook Packages: EngineeringEngineering (R0)