Filters








22 Hits in 3.6 sec

A Cryptographic Analysis of UMTS/LTE AKA [chapter]

Stephanie Alt, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, Benjamin Richard
2016 Lecture Notes in Computer Science  
In this paper, we provide a formal security analysis of the AKA protocol in its complete three-party setting.  ...  The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms.  ...  The cryptographic analysis of Lee et al.  ... 
doi:10.1007/978-3-319-39555-5_2 fatcat:o6y6urhhrfdnlak6wz6fnld2rm

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson
2014 International Journal of Information Security  
The UMTS/LTE protocol for mobile phone networks has been designed to offer a limited form of anonymity for mobile phone uses.  ...  We prove that the UMTS/LTE protocol meets both of these security definitions. Our analysis requires new assumptions on the underlying keyed functions for UMTS.  ...  Prior Security Analysis: A lot of prior analysis of the security of GSM/UMTS/LTE has gone into the properties of the underlying cryptographic functions, [7, 17, 20] .  ... 
doi:10.1007/s10207-014-0231-3 fatcat:xsxegftkzbcd3j7g3mbgscshza

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks

Chengzhe Lai, Hui Li, Rongxing Lu, Xuemin (Sherman) Shen
2013 Computer Networks  
In this paper, we propose a secure and efficient AKA protocol, called SE-AKA, which can fit in with all of the group authentication scenarios in the LTE networks.  ...  Extensive security analysis and formal verification by using proverif have shown that the proposed SE-AKA is secure against various malicious attacks.  ...  Acknowledgments This work is supported by China Scholarship Council, the National Natural Science Foundation of China Grant 61272457, 61102056, and the National Science and Technology Major Projects (No  ... 
doi:10.1016/j.comnet.2013.08.003 fatcat:ifyns5jjxje6hmypoy6rlhstkm

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols [chapter]

Joe-Kai Tsay, Stig F. Mjølsnes
2012 Lecture Notes in Computer Science  
We report on a deficiency in the specifications of the Authentication and Key Agreement (AKA) protocols of the Universal Mobile Telecommunications System (UMTS) and Long-Term Evolution (LTE) as well as  ...  An inside attacker may impersonate an honest user during a run of the protocol and apply the session key to use subsequent wireless services on behalf of the honest user.  ...  UMTS & LTE AKA Here we present a weakness found in the authentication protocol specifications of both UMTS and LTE AKA with the help of the tool CryptoVerif [12] .  ... 
doi:10.1007/978-3-642-33704-8_6 fatcat:jnny6idbsfainm4jmmhmkpp3q4

Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols [article]

Joe-Kai Tsay, Stig Mjølsnes
2013 arXiv   pre-print
This work constitutes the first security analysis of LTE AKA to date and the first computationally sound analysis of UMTS AKA.  ...  We present a computational security analysis of the Authentication and Key Agreement (AKA) protocols for both Long-Term Evolution (LTE) and Universal Mobile Telecommunications System (UMTS).  ...  Acknowledgements We thank Valtteri Niemi and Steve Babbage for helpful discussions on the feasibility of the session-mixup attack.  ... 
arXiv:1203.3866v2 fatcat:4p6lujccvjesbaznxtyx5vvu2q

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards [chapter]

Junrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie
2015 Lecture Notes in Computer Science  
In particular, we analyze instances of cards from a variety of operators and manufacturers, and describe successful Differential Power Analysis attacks that recover encryption keys and other secrets (needed  ...  Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones.  ...  As a result of this state-of-the-art, the move towards UMTS/LTE and the 3G/4G communication technology, whose security is based on standardized algorithms, was a very welcome improvement.  ... 
doi:10.1007/978-3-319-24174-6_24 fatcat:gthnuykz6zeghkg7hdybpqvbqq

Modifying authentication techniques in mobile communication systems

Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry
2014 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)  
This algorithm is used in the 3GPP authentication and key generation functions (f1, f1*, f2, f3, f4, f5 and f5*) for mobile communication systems (GSM/UMTS/LTE).  ...  A complete simulation of modified Milenage and PN sequence generator is done using Microcontroller (PIC18F452). security analysis is applied using Avalanche test to compare between the original and modified  ...  There are eight Cryptographic functions used in UMTS/LTE/Advanced LTE Authentication and Key Agreement to generate Authentication vector (AV). f 0 is the random challenge-generating function.  ... 
doi:10.1109/cybersec.2014.6913969 dblp:conf/cybersec/HassanEZ14 fatcat:saxpekvpjreqnhwpkyiltlyek4

A General IMS Registration Protocol for Wireless Networks Interworking [chapter]

Daniel Díaz-Sánchez, Davide Proserpio, Andrés Marín-López, Florina Almenárez-Mendoza, Peter Weik
2009 IFIP Advances in Information and Communication Technology  
This article proposes an improvement for IMS registration protocol able to relate IMS registration to an access network registration by cryptographically binding both of them.  ...  This leads to an overhead authentication that introduces a big delay.  ...  IMS services can be accessed independently from any access network as fixed networks, GPRS, UMTS, LTE, WIMAX and WiFi.  ... 
doi:10.1007/978-3-642-03841-9_4 fatcat:4d4xx4i2trcafghgwionv5mnt4

Privacy enhanced mutual authentication in LTE

Geir M. Koien
2013 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)  
This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost.  ...  To complete our proposal we also strengthen the requirements on the use of the temporary identifier (M-TMSI). T e l e n o r H S S T e l e n o r D u h a r f o r l i t e å g j ø r e !  ...  Having said that, we acknowledge that key management is a weak aspect of the EPS AKA protocol and that the analysis in [31] seems very solid.  ... 
doi:10.1109/wimob.2013.6673421 dblp:conf/wimob/Koien13 fatcat:55nra4lyk5bazopixep5j3jtga

Mobility and Key Management in SAE/LTE [chapter]

Anand R. Prasad, Julien Laganier, Alf Zugenmaier, Mortaza S. Bargh, Bob Hulsebosch, Henk Eertink, Geert Heijenk, Jeroen Idserda
2007 Signals and Communication Technology  
The means for using the cryptographic algorithm is the 'key' used by the algorithm. Thus management of keys and security there-of is an important issue.  ...  In this paper we review mobility and security issues with the focus of key management in SAE/LTE and present possible existing solutions together with their analysis.  ...  SAE allows integration of radio access networks based on different radio access technologies into the network, e.g., UMTS, LTE, wireless LAN and WiMAX.  ... 
doi:10.1007/978-0-387-73825-3_13 fatcat:upvs2zfoxbdk5fo6haqj7g7u6i

Formal verification of LTE-UMTS handover procedures

Piergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa
2015 2015 IEEE Symposium on Computers and Communication (ISCC)  
This paper presents a formal security analysis of the interoperability procedures between LTE and the older Universal Mobile Telecommunications System (UMTS) networks, when mobile devices seamlessly switch  ...  Most of the formal security analysis works in literature about LTE analyze authentication procedures, while interoperability is far less considered.  ...  Inter Radio Access Technology (Inter-RAT) handovers allow voice and data service to maintain the connection while moving from a radio access technology (GSM, UMTS, LTE, WiMAX or any other wireless technology  ... 
doi:10.1109/iscc.2015.7405602 dblp:conf/iscc/CopetMSC15 fatcat:7iz3avnpwfds3pygpo7hmusc5m

Formal verification of LTE-UMTS and LTE–LTE handover procedures

Piergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa
2017 Computer Standards & Interfaces  
Instead, for what concerns the analysis of LTE-UMTS and UMTS-LTE handover procedures, although some of the results presented here were already presented in [4], in this paper we extend those results by  ...  completes previous results with a deeper formal analysis of these procedures.  ...  In the LTE to UMTS, LTE X2 and LTE S1 handover models each MS also generates a fresh term used as K ASME (that in reality is established during the AKA).  ... 
doi:10.1016/j.csi.2016.08.009 fatcat:kl6czegvi5gpppr64c4o6wdtem

Security Issues on Machine to Machine Communications

Chengzhe Lai
2012 KSII Transactions on Internet and Information Systems  
and aggregate signature used to resolve security of small data transmission in M2M communications.  ...  new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic  ...  Existing solutions: Current GSM/UMTS/LTE mechanism should be used to protect low access priority indicator.  ... 
doi:10.3837/tiis.2012.02.003 fatcat:oii5nuafujbl5h6yhnlvrqjeje

Femtocell Security in Theory and Practice [chapter]

Fabian van den Broek, Ronny Wichers Schreur
2013 Lecture Notes in Computer Science  
We provide a first comprehensive analysis of the risks of attacks, given a general femtocell model. This analysis results in two new attacks.  ...  However, femtocells also introduce a number of security concerns. Several earlier femtocells have been hacked to varying degree and analyzed.  ...  Femtocell overview The femtocell idea can be applied to many different cellular communication networks, such as UMTS, LTE and EV-DO.  ... 
doi:10.1007/978-3-642-41488-6_13 fatcat:p77f6lmt5fgcfdj5aqk5koqify

Analysis of User Identity Privacy in LTE and Proposed Solution

Abdulrahman A. Muthana, Mamoon M. Saeed
2017 International Journal of Computer Network and Information Security  
This paper includes an evaluation of LTE security architecture and proposes a security solution for the enhancement of user identity privacy in LTE.  ...  Recently, he is a master student at department of Computer Networks and Information Technology in Yemen Academy for Graduate Studies.  ...  ANALYSIS In this section, we present the key features and the security analysis of the proposed solution, compare our solution against the standard AKA protocol as well as against related work. A.  ... 
doi:10.5815/ijcnis.2017.01.07 fatcat:x5puvznecjeh7eefpfzrikrmlm
« Previous Showing results 1 — 15 out of 22 results