Advertisement

Enhancing Security of LTE using a Double Masking Technique

  • Jung-Chun LiuEmail author
  • Yi-Li Huang
  • Fang-Yie Leu
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)

Abstract

LTE uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) procedure to establish and verify keys. However, the EPS-AKA is vulnerable to attacks such as disclosure of the user identity, man-in-the-middle attack and denial of services; therefore, a robust authentication mechanism is required. In this paper, we enhance security of LTE by using a double masking technique, in which both the identity key of the user equipment (UE), i.e., IMSI, and the random challenge key, i.e., RAND, are masked without being exposed in the authentication process. The proposed double masking technique is effective in performing mutual authentication of the user and the network. Security analysis shows that this technique is more secure than the original EPS-AKA since IMSI and RAND are well-protected and achieve practical security. Since all operators used in encrypting keys are simple and efficient, it works without degrading the performance of the existing LTE system.

Keywords

User Equipment Mutual Authentication Authentication Response Authentication Request Home Subscriber Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Purkhiabani and A. Salahi, “Enhanced Authentication and Key Agreement Procedure of next Generation 3GPP Mobile Networks,” International Journal of Information and Electronics Engineering, vol. 2, no. 1, January 2012, pp. 69-77.Google Scholar
  2. 2.
    N. Seddigh, B. Nandy, R. Makkar, and J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” Annual International Conference on Privacy, Security and Trust, 2010, pp. 62-71.Google Scholar
  3. 3.
    B. Rashidi and C. Fung, “A Survey of Android Security Threats and Defenses,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 3, September 2015, pp. 3-35.Google Scholar
  4. 4.
    M. Aiash, G.E. Mapp, A. Lasebae and R. Phan, “Providing Security in 4G Systems: Unveiling the Challenges,” Advanced International Conference on Telecommunications, 2010, pp. 439-444.Google Scholar
  5. 5.
    A. Skovoroda and D. Gamayunov, “Securing mobile devices: malware mitigation methods,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 2, June 2015, pp. 78-97.Google Scholar
  6. 6.
    M.A. Abdrabou, A.D.E. Elbayoumy, E.A. El-Wanis, “LTE Authentication Protocol (EPS-AKA) Weaknesses Solution,” IEEE International Conference on Intelligent Computing and Information Systems, 2015, pp. 434-441.Google Scholar
  7. 7.
    A.A. Mazroa, M. Arozullah, “Detection and Remediation of Attack by Fake Base Stations in LTE Networks,” International Journal of Soft Computing and Engineering vol. 5, issue-2, May 2015, pp. 12-15.Google Scholar
  8. 8.
    C.G. Apostol and C. Răcuciu, “Improving LTE EPS-AKA using the Security Request Vector,” 7th Edition Electronics, Computers and Artificial Intelligence, June 2015, pp. 185-188.Google Scholar
  9. 9.
    T. kurokawa, R. Nojima, and S. Moriai, “On the security of CBC Mode in SSL3.0 and TLS1.0,” Journal of Internet Services and Information Security, vol. 6, issue 1, February 2016, pp. 2-19.Google Scholar
  10. 10.
    Y.L. Huang, C.R. Dai, and F.Y. Leu, and I. You, “A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,” International Journal of Web and Grid Services, vol. 11, no. 1, January, 2015, pp. 102-124.Google Scholar
  11. 11.
    Y.L. Huang, F.Y. Leu and K.C. Wei, “A Secure Communication over Wireless Environments by using a Data Connection Core,” Mathematical and Computer Modelling, vol. 58, no. 5-6, September 2013, pp. 1459-1474.Google Scholar
  12. 12.
    A. Kitana, I. Traore, and I. Woungang, “Impact Study of a Mobile Botnet over LTE Networks,” Journal of Internet Services and Information Security, vol. 6, issue 2, May 2016, pp. 1-22.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceTunghai UniversityTaichungTaiwan

Personalised recommendations