Security Enhancement for LTE Authentication Protocol (EPS-AKA) | ||||
International Conference on Aerospace Sciences and Aviation Technology | ||||
Article 89, Volume 16, AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 16 – May 26 - 28, 2015, May 2015, Page 1-10 PDF (513.1 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/asat.2015.23028 | ||||
View on SCiNiTO | ||||
Authors | ||||
Mohammed Aly Abdrabou1; Dr. Essam Abd El-Wanis2; Assoc. Prof. Dr. Ashraf Diaa Eldien Elbayoumy2 | ||||
1Technical Research Center, Egyptian Armed Force, Egypt. | ||||
2Military Technical College, Egyptian Armed Force, Egypt. | ||||
Abstract | ||||
In Long Term Evolution (LTE) networks Extensible Authentication Protocol (EAP) is an authentication framework, not a specific authentication mechanism. EAP-AKA is one of the methods of EAP which uses the Authentication and Key Agreement (AKA) mechanism based on challenge-response mechanisms, EAP-AKA is used in the 3rd generation mobile networks then modified and inherited to 4th generation mobile networks (LTE) as Evolved Packet System Authentication and Key Agreement (EPS-AKA) mechanism. EPS-AKA vulnerabilities are disclosure of the user identity, Man in the Middle attack and Denial of Services (DoS) attacks so a robust authentication mechanism must replace EPS-AKA to avoid such attacks. In this paper, Modified Evolved Packet System Authentication and Key Agreement (MEPS-AKA) protocol based on Simple Password Exponential Key Exchange (SPEKE) is proposed to solve these problems. Scyther tool is used to verify the efficiency of the proposed protocol against the mentioned attacks. EPS-AKA and MEPS-AKA are simulated using C programming language to calculate the execution time for both algorithms. | ||||
Keywords | ||||
EAP-AKA; LTE; AKA; SPEKE; EPS-AKA; Scyther | ||||
Statistics Article View: 543 PDF Download: 720 |
||||