Evaluation of UMTS security architecture and services

This paper presents an in-depth analysis and evaluation of the security of UMTS. Four classes of attacks and threats are discussed in detail. Thereafter, the available security mechanism and services of UMTS are reviewed and evaluated. It is found that most of the potential attacks and threats can be thwarted by the available security services and mechanisms of UMTS.

[1]  Tetsu Iwata,et al.  New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms , 2004, FSE.

[2]  Iakovos S. Venieris,et al.  Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration , 2003, Mob. Networks Appl..

[3]  Flemming Nielson,et al.  Security for Mobility , 2002, FOSAD.

[4]  Mark Blunden,et al.  Related Key Attacks on Reduced Round KASUMI , 2001, FSE.

[5]  Lazaros F. Merakos,et al.  Security in third Generation Mobile Networks , 2004, Comput. Commun..

[6]  Mitsuru Matsui,et al.  New Block Encryption Algorithm MISTY , 1997, FSE.

[7]  Geir M. Køien,et al.  Access security in CDMA2000, including a comparison with UMTS access security , 2004, IEEE Wireless Communications.

[8]  Marine Minier,et al.  New Results on the Pseudorandomness of Some Blockcipher Constructions , 2001, FSE.

[9]  Kaisa Nyberg CRYPTOGRAPHIC ALGORITHMS FOR UMTS , 2004 .

[10]  Chris J. Mitchell,et al.  An analysis of the 3gpp-MAC scheme , 2001, Electron. Notes Discret. Math..

[11]  Ulrich Kühn,et al.  Improved Cryptanalysis of MISTY1 , 2002, FSE.

[12]  Chris J. Mitchell,et al.  Heterogeneous Internet Access via PANA / UMTS , 2004 .

[13]  Hahnsang Kim,et al.  Improving mobile authentication with new AAA protocols , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[14]  G.M. Koien,et al.  An introduction to access security in UMTS , 2004, IEEE Wireless Communications.

[15]  Georgios Kambourakis,et al.  Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..

[16]  Ulrich Kühn,et al.  Cryptanalysis of Reduced-Round MISTY , 2001, EUROCRYPT.

[17]  Steve Babbage,et al.  On MISTY1 Higher Order Differential Cryptanalysis , 2000, ICISC.

[18]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[19]  Toshinobu Kaneko,et al.  On the Strength of KASUMI without FL Functions against Higher Order Differential Attack , 2000, ICISC.

[20]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.