DOI QR코드

DOI QR Code

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE

LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증

  • Received : 2019.04.18
  • Accepted : 2019.06.20
  • Published : 2019.06.30

Abstract

In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

4세대 이동통신 기술인 LTE환경에서 사용자 단말기와 사용자를 확인하는 초기 식별자를 평문으로 전달하는 취약점으로 인한 사용자 정보가 노출되는 피해가 발생하고 있다. 본 논문에서는 고유 식별정보의 노출 문제점에 대한 해결책으로 시도응답을 이용한 일회용 패스워드와 AES기반의 Milenage 키 생성 알고리즘을 활용하여 안전한 초기 식별 통신을 위한 상호인증 프로토콜을 제안한다. Milenage 키 생성 알고리즘은 기존 프로토콜에서도 사용되고 있는 키 생성 알고리즘으로써 암호화 키, 무결성 키, 메시지 인증코드를 생성하는 알고리즘이다. LTE 네트워크에서 표준으로 사용되고 있는 LTE Security 프로토콜은 EPS-AKA를 기반으로 사용자 단말기와 사용자를 식별할 수 있는 초기 식별자를 상호인증시 노출되는 취약점이 나타나는 한계점으로 인해 UE 추적 가능성과 IMSI 노출로 인한 사용자 개인정보 노출 취약점을 보완하여 노출의 문제점을 최소화 한다.

Keywords

References

  1. 한국인터넷진흥원(2014), LTE 및 4G 이동통신망 구조 분석 및 보안 위협 연구, KISA-WP-2012-0037, 106-118.
  2. 한국인터넷진흥원(2011), 펨토셀 및 GRX 보안 취약점에 대한 연구, KISA-WP-2011-0033, 49-58.
  3. AlZain, M. A., E. Pardede, B. Soh, and A. T. James(2012), "Cloud computing security : From single to multi-clouds," 45th Hawaii International Conference on System Sciences. IEEE, 5490-5499.
  4. Boneh, D(1998), "The decision diffie-hellman problem," International Algorithmic Number Theory Symposium. Springer Berlin Heidelberg, 1423, 48-63.
  5. Casalicchio, E., and M. Palmirani(2015), "A cloud service broker with legal-rule compliance checking and quality assurance capabilities," Procedia Computer Science, 68, 136-150. https://doi.org/10.1016/j.procs.2015.09.230
  6. Choi, C. H.(2014), "CPND ecosystem ICCT (Information, Communication, Contents Technology)." Journal of Digital Convergence. 12(3). 7-16. https://doi.org/10.14400/JDC.2014.12.3.7
  7. Halpin, H.(2014), "The W3C web cryptography API: Motivation and overview," W3C, WWW'14 Companion, 7(14), 62-79.
  8. Han, J. H.(2015), "Effects of perceived usefulness and ease reliance on payment services and loyalty mall," Journal of Digital Convergence, 13(12), 75-87. https://doi.org/10.14400/JDC.2015.13.12.75
  9. Han, C. K., H. K. Choi, J. W. Baek, and H. W. Lee(2015), "Evaluation of authentication signaling loads in 3GPP LTE/SAE networks," 21-30.
  10. ISO/IEC 13157-2:2010, Information Technology - Telecommunications and Information Exchange between Systems - NFC Security - Part 2: NFC-SEC Cryptography Standard using ECDH and AES
  11. Kim, E. H.(2011), "Cloud service brokerage," Internet & Security Issue, 27-32,
  12. Lee, J. K., J. G. Son, H. M. Kim, and H. K. Oh(2013), "An authentication scheme for providing to user service transparency in multicloud environment," Journal of The Korea Institute of Information Security & Cryptology, 23(6), 1131-1141. https://doi.org/10.13089/JKIISC.2013.23.6.1131
  13. Lee, S. H.(2015), "Actual cases and analysis of IT convergence for green IT," Journal of the Korea Convergence Society, 6(6), 147-152. https://doi.org/10.15207/JKCS.2015.6.6.147
  14. TTA(2010), IMT-2000 3GPP-LTE RAN/3GPP SAE 내에서 보안 결정에 관한 가능성 연구, TTAT.3G-33.821, 41-48.
  15. Won, S. H., and H. S. Yang(2015), "Research and policy direction for the success of ICT-based company fusion," Journal of Digital Convergence, 13(4), 39-50. https://doi.org/10.14400/JDC.2015.13.4.39