Abstract
LTE uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) procedure to establish and verify keys. However, the EPS-AKA is vulnerable to attacks such as disclosure of the user identity, man-in-the-middle attack and denial of services; therefore, a robust authentication mechanism is required. In this paper, we enhance security of LTE by using a double masking technique, in which both the identity key of the user equipment (UE), i.e., IMSI, and the random challenge key, i.e., RAND, are masked without being exposed in the authentication process. The proposed double masking technique is effective in performing mutual authentication of the user and the network. Security analysis shows that this technique is more secure than the original EPS-AKA since IMSI and RAND are well-protected and achieve practical security. Since all operators used in encrypting keys are simple and efficient, it works without degrading the performance of the existing LTE system.
Keywords
- User Equipment
- Mutual Authentication
- Authentication Response
- Authentication Request
- Home Subscriber Server
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Purkhiabani and A. Salahi, “Enhanced Authentication and Key Agreement Procedure of next Generation 3GPP Mobile Networks,” International Journal of Information and Electronics Engineering, vol. 2, no. 1, January 2012, pp. 69-77.
N. Seddigh, B. Nandy, R. Makkar, and J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” Annual International Conference on Privacy, Security and Trust, 2010, pp. 62-71.
B. Rashidi and C. Fung, “A Survey of Android Security Threats and Defenses,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 3, September 2015, pp. 3-35.
M. Aiash, G.E. Mapp, A. Lasebae and R. Phan, “Providing Security in 4G Systems: Unveiling the Challenges,” Advanced International Conference on Telecommunications, 2010, pp. 439-444.
A. Skovoroda and D. Gamayunov, “Securing mobile devices: malware mitigation methods,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 2, June 2015, pp. 78-97.
M.A. Abdrabou, A.D.E. Elbayoumy, E.A. El-Wanis, “LTE Authentication Protocol (EPS-AKA) Weaknesses Solution,” IEEE International Conference on Intelligent Computing and Information Systems, 2015, pp. 434-441.
A.A. Mazroa, M. Arozullah, “Detection and Remediation of Attack by Fake Base Stations in LTE Networks,” International Journal of Soft Computing and Engineering vol. 5, issue-2, May 2015, pp. 12-15.
C.G. Apostol and C. Răcuciu, “Improving LTE EPS-AKA using the Security Request Vector,” 7th Edition Electronics, Computers and Artificial Intelligence, June 2015, pp. 185-188.
T. kurokawa, R. Nojima, and S. Moriai, “On the security of CBC Mode in SSL3.0 and TLS1.0,” Journal of Internet Services and Information Security, vol. 6, issue 1, February 2016, pp. 2-19.
Y.L. Huang, C.R. Dai, and F.Y. Leu, and I. You, “A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,” International Journal of Web and Grid Services, vol. 11, no. 1, January, 2015, pp. 102-124.
Y.L. Huang, F.Y. Leu and K.C. Wei, “A Secure Communication over Wireless Environments by using a Data Connection Core,” Mathematical and Computer Modelling, vol. 58, no. 5-6, September 2013, pp. 1459-1474.
A. Kitana, I. Traore, and I. Woungang, “Impact Study of a Mobile Botnet over LTE Networks,” Journal of Internet Services and Information Security, vol. 6, issue 2, May 2016, pp. 1-22.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Liu, JC., Huang, YL., Leu, FY. (2017). Enhancing Security of LTE using a Double Masking Technique. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_75
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_75
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)