Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection

Zhang et al. (2005) proposed an authentication key agreement protocol for 3GPP-AKA protocol. They claim that their protocol can withstand the redirection attack, the attack in corrupted networks, and can solve the operational difficulty with the sequence numbers problem. In wireless communications, identity privacy is an important security issue we concern. There are two abnormal cases that a mobile station (MS) must send its real identity to a visited location register (VLR) when authenticating at location updating. One is that VLR can not verify EVISI of MS and the other is that VLR can not reach the previously visited VLR. We can find out that the identity of the user are exposed when the adversary carries out the location privacy attack at location updating. For preventing the location privacy attack, users' identities must be protected for 3GPP-AKA protocol. However, we point out that Zhang et al.'s improved 3GPP-AKA protocol is vulnerable to the location privacy attack, having higher space overhead on VLR, and having higher bandwidth consumption between HLR and VLR. In this paper, we propose an efficient authenticated key agreement scheme for 3GPP-AKA to overcome all the drawbacks of Zhang et al.'s scheme.

[1]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[2]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[3]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[4]  Paul F. Syverson,et al.  A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.

[5]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[6]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[7]  Chin-Chen Chang,et al.  Efficient authentication protocols of GSM , 2005, Comput. Commun..

[8]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[9]  Min-Shiang Hwang,et al.  Cryptanalysis of Simple Authenticated Key Agreement Protocols , 2004 .

[10]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Wen-Shenq Juang Efficient User Authentication and Key Agreement in Ubiquitous Computing , 2006, ICCSA.

[12]  Young Jae Choi,et al.  An Improvement on Privacy and Authentication in GSM , 2004, WISA.

[13]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[14]  Shiuh-Jeng Wang,et al.  Anonymous wireless authentication on a portable cellular mobile system , 2004, IEEE Transactions on Computers.

[15]  M. Beller,et al.  Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .