Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS

In a Universal Mobile telecommunications system IP multimedia subsystem (IMS), even when an IMS subscriber has passed the packet-switch domain authentication, the IMS subscriber's identity must be confirmed by the IMS authentication again before accessing IMS services. Both the packet-switch domain and the IMS authentications are necessary for the IMS subscriber. This is referred to as a two-pass authentication. However, the packet-switch domain authentication is carried out by the authentication and key agreement (AKA) of the 3rd generation partnership projects (3GPP), called 3GPP AKA; the IMS authentication is carried out by IMS AKA. Since IMS AKA is based on 3GPP AKA, almost all of the operations are the same. It is inefficient because almost all the involved steps in the two-pass authentication are duplicated. Hence, the one-pass authentication was proposed to increase the efficiency of the IMS authentication. Unfortunately, the one-pass authentication has some security problems and loses the mutual AKA capabilities. Therefore, in this paper, an evolutionary IMS AKA (E-IMS AKA) in the IMS authentication is proposed to replace the IMS AKA. E-IMS AKA not only adheres to the security requirements of IMS AKA, but also maintains the efficiency of the one-pass authentication method.

[1]  Yi-Bing Lin,et al.  One-pass GPRS and IMS authentication procedure for UMTS , 2005, IEEE Journal on Selected Areas in Communications.

[2]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[3]  Yi-Bing Lin,et al.  Reducing authentication signaling traffic in third-generation mobile network , 2003, IEEE Trans. Wirel. Commun..

[4]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.

[5]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[6]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[7]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[8]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[9]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[10]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[11]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  Lawrence C. Stewart,et al.  HTTP Authentication: Basic and Digest Access Authentication , 1999 .

[14]  Ralph C. Merkle,et al.  One Way Hash Functions and DES , 1989, CRYPTO.