+7 925 966 4690, 9am6pm (GMT+3), Monday – Friday
ИД «Финансы и кредит»

JOURNALS

  

FOR AUTHORS

  

SUBSCRIBE

    
National Interests: Priorities and Security
 

A modified method to design the LTE authentication protocol EPS-AKA algorithm using the query vector

Vol. 15, Iss. 4, APRIL 2019

Received: 31 January 2019

Received in revised form: 22 February 2019

Accepted: 15 March 2019

Available online: 15 April 2019

Subject Heading: THREATS AND SECURITY

JEL Classification: C63, М15

Pages: 784–794

https://doi.org/10.24891/ni.15.4.784

Kormil'tsev N.V. Kazan National Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
kormiltcev@hotmail.com

https://orcid.org/0000-0002-2289-5672

Uvarov A.D. Kazan National Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
obg-96@mail.ru

https://orcid.org/0000-0003-0337-2689

Mikhailov A.A. Kazan National Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
Alex-0995@mail.ru

ORCID id: not available

Tumbinskaya M.V. Kazan National Research Technical University named after A.N. Tupolev – KAI (KNRTU-KAI), Kazan, Republic of Tatarstan, Russian Federation
tumbinskaya@inbox.ru

ORCID id: not available

Subject This article deals with the development of a modified method of the LTE authentication protocol EPS-AKA algorithm design using the query vector in the fourth generation of LTE communication standards.
Objectives The article aims to explore the possibility of solving the problem of obtaining international mobile subscriber identity (IMSI) in the clear during EPS-AKA authentication in the LTE network using Public Key Infrastructure (PKI).
Methods For the study, we used the methods of mathematical and hardware modeling.
Results We offer a modified method to develop the LTE authentication protocol EPS-AKA algorithm using the query vector based on the correlation of UE authentication requests with the international mobile equipment identity (IMEI), which is stored in a special security vector (SV) for the latest authentication requests received and stored in the HSS. Thus, the HSS can be protected from DoS attacks, which are not eliminated by the conventional protection methods included in the LTE standard.

Keywords: EPS-AKA, LTE, MME, E-UTRAN, mobile security, authentication

References:

  1. Lapsar' A.P., Lapsar' S.A. [Safety of innovation under competitive struggle]. Finansy i kredit = Finance and Credit, 2017, vol. 23, iss. 1, pp. 49–62. (In Russ.) URL: Link
  2. Kormil'tsev N.V., Uvarov A.D., Kornilov G.S., Perukhin M.Yu. [Optimizing the authentication process protecting confidential user data when connecting to the LTE network]. Vestnik Tekhnologicheskogo universiteta = Herald of Kazan Technological University, 2018, vol. 21, no. 3, pp. 134–138. (In Russ.)
  3. Kazarin O.V. [Multi-party secure computation in the problem of collisions prevention]. Vestnik komp'yuternykh i informatsionnykh tekhnologii = Herald of Computer and Information Technologies, 2017, no. 6, pp. 50–56. (In Russ.) URL: Link
  4. Kormil'tsev N.V., Uvarov A.D. [Methods to create a IMSI trap to intercept GSM packets]. Vestnik sovremennykh issledovanii, 2018, no. 3-2 (18), pp. 137–139. (In Russ.) URL: Link
  5. Korionov I.P., Orlov V.G. [User-defined security aspects of LTE networks]. Telekommunikatsii i informatsionnye tekhnologii = Telecommunications and Information Technologies, 2017, no. 2, pp. 16–21. URL: Link (In Russ.)
  6. Petrenko A.A., Petrenko S.A. [Method for increasing the LTE-network stability in destructive cyber attacks]. Voprosy kiberbezopasnosti = Cybersecurity Issues, 2015, no. 2, pp. 36–42. URL: Link (In Russ.)
  7. Barmina S.S., Tadzhibaeva F.M., Tumbinskaya M.V. [Correlation analysis and forecasting of SYN-flood attacks]. Prikladnaya informatika = Journal of Applied Informatics, 2018, vol. 13, no. 4, pp. 93–102. URL: Link (In Russ.)
  8. Steputin A.N., Nikolaev A.D. Mobil'naya svyaz' na puti k 6G. V 2-kh tomakh [Mobile communication on the way to 6G. In two volumes]. Vologda, Infra-Inzheneriya Publ., 2017, vol. 1, pp. 23–45. (In Russ.)
  9. Ermakov S.A., Kolenbet N.S., Yurasov V.G., Bataronov I.L. [Security architecture in LTE cellular networks]. Informatsiya i bezopasnost' = Information and Security, 2014, vol. 17, no. 4, pp. 626–629. (In Russ.)
  10. Listopad M.E., Korotchenko S.E. [Improving the method for evaluation of the information security system in Russia]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2017, vol. 13, iss 6, pp. 1162–1175. (In Russ.) URL: Link
  11. Terent'ev A.M. [Selecting adequate means of information protection of personal computer in Russia]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2012, vol. 8, iss. 33, pp. 37–42. URL: Link (In Russ.)
  12. Revenkov P.V., Berdyugin A.A. [Cybersecurity in the Internet of things and electronic banking]. Natsional'nye interesy: prioritety i bezopasnost' = National Interests: Priorities and Security, 2016, vol. 12, iss. 11, pp. 158–169. URL: Link (In Russ.)
  13. Asiryan V.M., Shishkin M.O., Stepanov M.S. [Assessment of the resource cell of the LTE network during the maintenance of the elastic traffic]. Telekommunikatsii i informatsionnye tekhnologii = Telecommunications and Information Technologies, 2018, vol. 5, no. 1, pp. 76–82. URL: Link (In Russ.)

View all articles of issue

 

ISSN 2311-875X (Online)
ISSN 2073-2872 (Print)

Journal current issue

Vol. 20, Iss. 4
April 2024

Archive