EPS mutual authentication and crypt-analyzing SPAKA

LTE's success as a high throughput, low latency, and umbrella technology for wireless heterogeneous networks is highly affected by the researchers' capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome vulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP's mutual authentication implementation in EPS AKA succeeded in enhancing the network's security, but failed to cover weaknesses inherited from its predecessor (UMTS). One of those vulnerabilities is the passive capturing of IMSIs during user identification in the Authentication and Key Agreement protocol. Many researchers tried over the past years, to propose an alternative for EPS AKA, able to ensure high levels of security and offer acceptable QoS performance. In this paper, we will crypt-analyze (SPAKA and PBKP) which was claimed to solve EPS AKA's privacy and mutual authentication weaknesses, then we will compare its QoS performance to EC-AKA and EPS AKA. Our proposed protocol “EC-AKA” is a real candidate to replace the current authentication and Key Agreement protocol, because of its excellent performance in all the studied parameters.

[1]  Weichao Wang,et al.  Homogeneous Security in Heterogeneous Networks: Towards a Generic Security Management Protocol , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[2]  Dan Forsberg,et al.  LTE Security , 2010 .

[3]  Jacques Bou Abdo,et al.  Ensured confidentiality authentication and key agreement protocol for EPS , 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA).

[4]  Hakima Chaouchi,et al.  On the Integration of LTE and Mobile WiMAX Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[5]  G. Pujolle,et al.  A distributed trust and reputation model for capacity enhancement in wireless networks , 2008, 2008 1st IFIP Wireless Days.

[6]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  G. Pujolle,et al.  A Trusted Handoff Decision Scheme for the Next Generation Wireless Networks , 2008 .

[8]  Dake He,et al.  User authentication scheme based on self-certified public-key for next generation wireless network , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[9]  Jian-Hua Li,et al.  Security Protocol Analysis with Improved Authentication Tests , 2006, ISPEC.

[10]  Dan Forsberg,et al.  LTE Security: Horn/LTE Security , 2010 .

[11]  Hakima Chaouchi,et al.  SECURITY V /S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL , 2012 .