Simple Search:

An efficient authentication and key agreement protocol for 4G (LTE) networks


Citation

Alezabi, Kamal Ali and Hashim, Fazirulhisyam and Hashim, Shaiful Jahari and Mohd Ali, Borhanuddin (2014) An efficient authentication and key agreement protocol for 4G (LTE) networks. In: 2014 IEEE Region 10 Symposium, 14-16 Apr. 2014, Kuala Lumpur, Malaysia. (pp. 502-507).

Abstract / Synopsis

Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.


Download File

[img]
Preview
PDF (Abstract)
An efficient authentication and key agreement protocol for 4G (LTE) networks.pdf

Download (38kB) | Preview

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Engineering
DOI Number: https://doi.org/10.1109/TENCONSpring.2014.6863085
Publisher: IEEE
Keywords: EEPS-AKA; EPS-AKA; LTE; SPEKE
Depositing User: Nabilah Mustapa
Date Deposited: 03 Aug 2016 12:28
Last Modified: 26 May 2017 13:22
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.1109/TENCONSpring.2014.6863085
URI: http://psasir.upm.edu.my/id/eprint/47995
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item