Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2011.18C.4.237

Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network  

Han, Chan-Kyu (성균관대학교 휴대폰학과)
Choi, Hyoung-Kee (성균관대학교 정보통신공학부)
Abstract
LTE/SAE has presented the handover key management to revoke the compromised keys and to isolate corrupted network devices. In this paper, we identify that the handover key management is vulnerable to so-called de-synchronization attacks, which is jeopardizing the forward secrecy of handover key management. We place an emphasis on periodic root key update to minimize the effect of the de-synchronization attacks. An optimal value for the root key update interval is suggested in order to minimize signaling load and ensure security of user traffic.
Keywords
3GPP; LTE Security; Handover Security; Optimization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Zhang et al., "An Improvement for Authentication Protocol in Third-Generation Wireless Networks," IEEE Trans. Wireless Commun, Vol.5, No.9, Sep., 2006.   DOI   ScienceOn
2 L.-Y. Wu, et al., "Authentication Vector Management for UMTS," IEEE Trans. Wireless Commun., Vol.6, No.11, Nov., 2007.   DOI   ScienceOn
3 J.-A. Saraireh, et al., "A New Authentication Protocol for UMTS Mobile Networks," EURASIP Wireless Commun. and Networking., Oct., 2010.
4 S. Pack, et al., "Optimal Binding-Management-Key Refresh Interval in Mobile IPv6 Networks," IEEE Transactions on Vehicular Technology, Vol.58, No.7, Sep., 2009.   DOI   ScienceOn
5 3GPP TR 33.821, "Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE)," Jun., 2009.
6 D. Forsberg, "LTE Key Management Analysis with Session Keys Context," ELSEVIER Comput. Commun., Oct., 2010.
7 Y.-B. Lin, et al., "One-pass GPRS and IMS Authentication Procedure for UMTS," IEEE J. Sel. Areas Commun., Jun., 2005.   DOI   ScienceOn
8 Y.-B. Lin, et al., "Reducing Authentication Signaling Traffic in Third-Generation Mobile Network," IEEE Trans. Wireless Commun., May, 2003.   DOI   ScienceOn
9 이호우, "대기행렬이론: 확률과정론적 분석", 시그마프레스 1996.
10 U.S. Census Bureau TIGER. http://www.census.gov/geo/www/tiger/
11 3GPP TS 33.401, "Security architecture," Dec., 2009.
12 M. Zhang, et al., "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., Mar., 2005.   DOI   ScienceOn