An Analysis of Authentication and Key Agreement Protocols in UMTS

UMTS에서 인증 및 키 동의 프로토콜에 대한 분석

  • Cui Yong-Gang (Department of Computer Science and Engineering, Hanyang University) ;
  • Kim Dae-Young (Department of Computer Science and Engineering, Hanyang University) ;
  • Kim Sang-Jin (School of Internet Media Engineering, Korea University of Technology and Education) ;
  • Oh Hee-Kuck (Department of Computer Science and Engineering, Hanyang University)
  • 최용강 (한양대학교, 컴퓨터공학과) ;
  • 김대영 (한양대학교, 컴퓨터공학과) ;
  • 김상진 (한국기술교육대학교 인터넷미디어공학부) ;
  • 오희국 (한양대학교, 컴퓨터공학과)
  • Published : 2006.06.01

Abstract

In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA is used to authenticate MSs (Mobile Stations). When an MS is in a foreign network, the serving network contacts the AuC (Authentication Center) located at the home network of the MS to authenticate it. To reduce this cost, AuC sends n AVs(Authentication Vectors) to the serving network. Although the use of AVs allows the serving network to authenticate an MS without contacting the AuC each time, there are also shortcomings such as synchronization problem. Subsequently, a set of protocols adopting the same or similar method have been proposed. In this paper, we analyze and compare authentication protocols for UMTS with respect to the use of AVs and its alternatives. We conclude that using Kerberos-like ticket key overcomes some of the drawbacks of using AVs, whereas AVs provide much better security.

Keywords