S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks

The authentication and key agreement (AKA) protocol of Universal Mobile Telecommunication System (UMTS), which is proposed to solve the vulnerabilities found in Global System for Mobile Communications (GSM) systems, is still vulnerable to redirection and man-in-the-middle attacks. An adversary can mount these attacks to eavesdrop or mischarge the subscribers in the system. In this paper, we propose a secure AKA (S-AKA) protocol to cope with these problems. The S-AKA protocol can reduce bandwidth consumption and the number of messages required in authenticating mobile subscribers. We also give the formal proof of the S-AKA protocol to guarantee its robustness.

[1]  Victor Shoup,et al.  On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..

[2]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[3]  Muxiang Zhang Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks , 2003, ICISC.

[4]  Muxiang Zhang,et al.  Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol , 2003, IACR Cryptol. ePrint Arch..

[5]  Alberto Peinado,et al.  Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..

[6]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[7]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[8]  Yi-Bing Lin,et al.  One-pass GPRS and IMS authentication procedure for UMTS , 2005, IEEE Journal on Selected Areas in Communications.

[9]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[10]  Sufian Yousef,et al.  A New Authentication Protocol for UMTS Mobile Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[11]  S. Imre Novel Authentication Algorithm - Public Key Based Cryptography in Mobile Phone Systems , 2006 .

[12]  Chun-I Fan,et al.  Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[13]  B. Sathish Babu,et al.  A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..

[14]  Yuefei Zhu,et al.  Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS , 2010, IEEE Communications Letters.

[15]  Jung-Wen Lo,et al.  Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol , 2010, Int. J. Netw. Secur..

[16]  Abid Ali Minhas,et al.  A Novel Security Algorithm for Universal Mobile Telecommunication System , 2010 .

[17]  Chun-I Fan,et al.  Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications , 2010, IEEE/ACM Transactions on Networking.

[18]  Min-Shiang Hwang,et al.  A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..