Achieving Better Privacy for the 3GPP AKA Protocol

نویسندگان

  • Pierre-Alain Fouque
  • Cristina Onete
  • Benjamin Richard
چکیده

Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between clients and associated network servers. As a result AKA must guarantee the indistinguishability from random of the session keys (key-indistinguishability), as well as clientand server-impersonation resistance. A paramount requirement is also that of client privacy, which 3GPP defines in terms of: user identity confidentiality, service untraceability, and location untraceability. Moreover, since servers are sometimes untrusted (in the case of roaming), the AKA protocol must also protect clients with respect to these third parties. Following the description of client-tracking attacks e.g. by using error messages or IMSI catchers, van den Broek et al. and respectively Arapinis et al. each proposed a new variant of AKA, addressing such problems. In this paper we use the approach of provable security to show that these variants still fail to guarantee the privacy of mobile clients. We propose an improvement of AKA, which retains most of its structure and respects practical necessities such as keymanagement, but which provably attains security with respect to servers and Man-in-the-Middle (MiM) adversaries. Moreover, it is impossible to link client sessions in the absence of client-corruptions. Finally, we prove that any variant of AKA retaining its mutual authentication specificities cannot achieve client-unlinkability in the presence of corruptions. In this sense, our proposed variant is optimal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Adaptive Security Protocol in Lte Aka

A Telecommunication systems trust and privacy is as good as its security mechanism. Its security design keep evolving over time as new treats and technology evolve. LTE/SAE is 3GPP’s wireless Communication new DNA, a move away from a hybrid of packet switched and circuit switched network which 3G networks possess, though with room for backward compatibility. LTE/SAE’s new architecture is a flat...

متن کامل

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks

To support Evolved Packet System (EPS) in the Long Term Evolution (LTE) networks, the 3rd Generation Partnership Project (3GPP) has proposed an authentication and key agreement (AKA) protocol, named EPS-AKA, which has become an emerging standard for fourth-generation (4G) wireless communications. However, due to the requirement of backward compatibility, EPS-AKA inevitably inherits some defects...

متن کامل

A Secure One-Way Authentication Protocol in IMS Context

The IMS (IP Multimedia Subsystem) architecture is the key control for next generation networks (NGN). IMS gives network operators the opportunity to extend their services, including voice and multimedia communications and deliver them in new environments with new goals. Its security is paramount, especially authentication. In IMS, authentication is divided into two phases a PS (Packet-Switch) d...

متن کامل

مروری بر پروتکل احراز اصالت و توافق کلیدEAP-AKA در شبکۀ میان‌کاری 3GPP-WLAN

پوشش‌دهی مناسب، دسترس‌‌‌پذیری و سرعت ‌بالای انتقال داده از مهم‌ترین مسائل در مخابرات نسل جدید است. بر همین اساس از مخابرات نسل سوم، ارائۀ خدمات میان‌کاری مطرح شد و در مخابرات نسل چهارم بیشتر مورد توجه قرار گرفت. بر همین اساس فناوری‌های متفاوتی برای ارائۀ خدمات میان‌کاری، در مخابرات نسل جدید مطرح شد که از این ‌بین، فناوری WLAN بیشتر از همه مورد استقبال قرار گرفت. مرجع استانداردسازی 3GPP برای ارا...

متن کامل

A Physical-Layer Authentication Assisted Scheme for Enhancing 3GPP Authentication

The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016