Secure-AKA: An Efficient AKA Protocol for UMTS Networks

In this paper, we propose an improved and efficient authentication and key agreement (AKA) protocol named “Secure-AKA” to prevent Universal Mobile Telecommunication System (UMTS) network from various attacks like man-in-the-middle attack, redirection attack, replay attack, active attacks in the corrupted UMTS networks, and especially denial of service attack. This protocol completely eliminates the need of counter synchronization between a mobile station and its home network, and protects the actual identity of each user over the network by generating a temporary identity during the authentication. The Secure-AKA protocol generates minimum communication and computation overheads as compared to UMTS-AKA, S-AKA, AP-AKA, EURASIP-AKA, COCKTAIL-AKA, X-AKA, and EXT-AKA protocols. On an average, Secure-AKA protocol reduces 65 % of the bandwidth consumption during the authentication process in comparison to UMTS-AKA, which is the maximum reduction of bandwidth by any AKA protocol referred in the paper.

[1]  Abid Ali Minhas,et al.  A Novel Security Algorithm for Universal Mobile Telecommunication System , 2010 .

[2]  Colin Boyd,et al.  Toward Non-parallelizable Client Puzzles , 2007, CANS.

[3]  Ari Juels,et al.  $evwu Dfw , 1998 .

[4]  Neetesh Saxena,et al.  A secure approach for SMS in GSM network , 2012, CUBE.

[5]  Ratan K. Guha,et al.  Discovering Man-in-the-Middle Attacks in Authentication Protocols , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[6]  Mark John Taylor,et al.  A Framework for the Forensic Investigation of Unstructured Email Relationship Data , 2011, Int. J. Digit. Crime Forensics.

[7]  Guohong Cao,et al.  Win-Coupon: An incentive framework for 3G traffic offloading , 2011, 2011 19th IEEE International Conference on Network Protocols.

[8]  Chih-Ya Shen,et al.  S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks , 2011, IEEE Transactions on Vehicular Technology.

[9]  Asadollah Shahbahrami,et al.  EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM , 2012 .

[10]  Colin Boyd,et al.  Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection , 2011, ICISC.

[11]  Cheng-Chi Lee,et al.  Extension of an Efficient 3GPP Authentication and Key Agreement Protocol , 2013, Wirel. Pers. Commun..

[12]  Alberto Peinado,et al.  Privacy and authentication protocol providing anonymous channels in GSM , 2004, Comput. Commun..

[13]  Neetesh Saxena,et al.  NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks , 2014 .

[14]  Muxiang Zhang,et al.  Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol , 2003, IACR Cryptol. ePrint Arch..

[15]  Samir Ranjan Das,et al.  Moving bits from 3G to metro-scale WiFi for vehicular network access: An integrated transport layer solution , 2011, 2011 19th IEEE International Conference on Network Protocols.

[16]  Douglas Stebila,et al.  Towards Denial-of-Service-Resilient Key Agreement Protocols , 2009, ACISP.

[17]  Neeli R. Prasad,et al.  Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks , 2011, Int. J. Digit. Crime Forensics.

[18]  Dapeng Wu,et al.  An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.

[19]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[20]  Jung-Wen Lo,et al.  Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol , 2010, Int. J. Netw. Secur..

[21]  Wu-chi Feng,et al.  Design and implementation of network puzzles , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[22]  Chun-I Fan,et al.  Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[23]  T. Hamano,et al.  A redirection-based defense mechanism against flood-type attacks in large-scale ISP networks , 2004, APCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding.

[24]  Min-Shiang Hwang,et al.  A cocktail protocol with the Authentication and Key Agreement on the UMTS , 2010, J. Syst. Softw..

[25]  Taieb Znati,et al.  A Guided Tour Puzzle for Denial of Service Prevention , 2009, 2009 Annual Computer Security Applications Conference.

[26]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[27]  Neetesh Saxena,et al.  SecureSMS: A secure SMS protocol for VAS and other applications , 2014, J. Syst. Softw..

[28]  K. P. Lam,et al.  On the Performance of Li's Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations , 2011, Int. J. Digit. Crime Forensics.

[29]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[30]  Yi-Bing Lin,et al.  One-pass GPRS and IMS authentication procedure for UMTS , 2005, IEEE Journal on Selected Areas in Communications.

[31]  Ulrike Meyer,et al.  A man-in-the-middle attack on UMTS , 2004, WiSe '04.

[32]  Yin Xu,et al.  Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow Control , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[33]  Yuefei Zhu,et al.  Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS , 2010, IEEE Communications Letters.

[34]  Min-Shiang Hwang,et al.  The UMTS-AKA Protocols for Intelligent Transportation Systems , 2009, EURASIP J. Wirel. Commun. Netw..

[35]  Sufian Yousef,et al.  A New Authentication Protocol for UMTS Mobile Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[36]  Colin Boyd,et al.  Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols , 2011, CT-RSA.

[37]  Hsiao-Hwa Chen,et al.  A Selective Downlink Scheduling Algorithm to Enhance Quality of VOD Services for WAVE Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[38]  B. Sathish Babu,et al.  A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..

[39]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .

[40]  Georgios Kambourakis,et al.  Signaling-Oriented DoS Attacks in UMTS Networks , 2009, ISA.