Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.3.81

A UMTS Key Agreement Protocol Providing Privacy and Perfect Forward Secrecy  

Kim, Dae-Young (Hanyang University)
Cui, Yong-Gang (Hanyang University)
Kim, Sana-Jin (Korea University of Technology and Education)
Oh, Hee-Kuck (Hanyang University)
Abstract
In the UMTS (Universal Mobile Telecommunication System), which is one of 3G mobile communication standards, the protocol called UMTS AKA (Authentication and Key Agreement) is used to authenticate mobile stations. However, the UMTS AKA protocol has some weakness, including network bandwidth consumption between a SN (Serving Network) and a HN (Home Network) and SQN (SeQuence Number) synchronization. In this paper, we propose a new improved protocol for UMTS that overcomes UMTS AKA weakness. Our protocol solves the privacy problem caused by IMSI (International Mobile Subscriber Identity)'s disclosure and provides perfect forward secrecy using ECDH (Elliptic Curve Diffie Hellman).
Keywords
UMTS; Perfect Forward Secrecy; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 3GPP TS 33.102 (v7.0.0), Security architecture, Release 7, 2005
2 G. Kambourakis, A. Roukas, and S. Gritzalis, 'Performance Evaluation of Public key based Authentication in Future Mobile Communication System,' EURASIP J. on Wireless Communications and Networking, Vol. 2004, No. 1, pp. 184-1997, 2004   DOI
3 C. Huang and J. Li, 'Authentication and Key Agreement Protocol for UMTS with Low Bandwidth,' Proc. of the 19th IEEE Conf. on AINA, pp.392-397, 2005
4 M. Zhang and Y. Fang, 'Security Analysis and Enhancement of 3GPP Authentication and Key Agreement Protocol,' IEEE Trans. on Wireless Communications, Vol. 4, No. 2, pp.734-742, 2005   DOI   ScienceOn
5 L. Harn and W.J. HSin, 'On the Security of Wireless Network Access with Enhancements,' Proc. of the ACM Workshop on Wireless Security, pp.88-95, 2003
6 U. Meyer and J. Li, 'A Man-in-the-Middle Attack on UMTS,' Proc. of the ACM Workshop on Wireless Security, pp. 90-97, 2004