• Corpus ID: 15115174

Security Mechanisms in UMTS

@article{Ptz2001SecurityMI,
  title={Security Mechanisms in UMTS},
  author={Stefan P{\"u}tz and Roland Schmitz and Tobias Martin},
  journal={Datenschutz und Datensicherheit},
  year={2001},
  volume={25}
}
This contribution presents an overview of the security of the 3 generation mobile radio system UMTS as currently standardised by the 3 Generation Partnership Project 3GPP. We discuss the underlying principles and show to which extent the security of 2 generation systems as GSM is improved and enhanced by UMTS. The UMTS Authentication and Key Agreement protocol, the security algorithms deployed for UMTS and the interworking mechanisms between 2 and 3 generation systems are described in detail. 

Figures from this paper

A survey of threats and security measures for data transmission over GSM/UMTS networks
TLDR
Findings of a threat analysis of data transmission over GSM/UMTS networks are presented and a catalog of technical and organizational security measures are developed to consider which threats can be prevented or mitigated by these measures.
Security analysis of LTE/SAE networks with the possibilities of tampering E-Utran on NS3
  • Garima Singh, D. Shrimankar
  • Computer Science
    2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
  • 2017
TLDR
The authors simulated the LTE environment on NS3 network simulation platform, uncovered various E-UTRAN tampering possibilities with the effects on the throughput and delay rate and suggested approaches that prevent secrecy over the wireless interface and secure handovers in an efficient manner.
SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks
TLDR
The security enhanced and computationally efficient (SEACE) protocol for UMTS networks preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network.
PASE-AKA: Performance and Security Enhanced AKA Protocol for UMTS Network
TLDR
The PASE-AKA protocol solves the problem of single key during the authentication process and avoids all the identified attacks on the communication network and provides the improved security compared to existing UMTS- AKA protocols with acceptable communication and computation overhead.
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems
TLDR
Simulation of A5/3 and f8 encryption algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication and provides the mean to regain control over privacy and authentication.
ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks
TLDR
This paper proposes an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks, and solves the synchronization problem occurred between a mobile station MS and its home network HLR.
Secure Roaming and Handover Procedures in Wireless Access Networks
TLDR
The goal of this thesis is to model the security challenges imposed on infrastructurebased wireless access networks by inter-provider and inter-system roaming and handover procedures, to analyze current solutions in this model, and to develop new security solutions.
Retracted: Secure Conversation Using Cryptographic Algorithms in 3G Mobile Communication
TLDR
F8 is confidentiality algorithms developed by 3GPP, bringing out the commonality between A5/3 and GEA3 algorithms, which are used by Mobile Subscribers to protect the privacy of their cellular voice and data communication.
Performance Analysis of 3 G Protocol : Encryption and Authentication
TLDR
The analysis results revealed the effect of authentication and encryption algorithms of 3G system performance defined in terms of throughput, and comparison between the algorithms in term s of time complexity.
Performance Analysis of Mobile Security Protocols: Encryption and Authentication
TLDR
The results of analysis reveal the effect of authentication and encryption algorithms of 2G and 3G on system performance defined in terms of throughput which will further help in quantifying the overhead caused due to security.
...
...

References

SHOWING 1-10 OF 19 REFERENCES
On the Security of the UMTS System
This contribution presents an overview of the security of the 3rd generation mobile radio system UMTS as currently standardised by the 3rd Generation Partnership Project 3GPP. We discuss the
Security for the core network of third generation mobile systems
  • R. Schmitz
  • Computer Science
    Communications and Multimedia Security
  • 2001
TLDR
An overview of the protocols that need to be secured, the basic principles behind the overall security architecture and the key management and format of secured messages are described, as far as they have already been finalised by 3GPP.
Review of third generation mobile system security architecture
TLDR
An in-depth review of two selected features which are new compared to second generation mobile systems, namely a protocol for mutual authentication and key agreement and a mechanism for integrity protection of signalling messages are given.
Secure interoperation between 2G and 3G mobile radio networks
TLDR
All relevant roaming and handover cases between 2G and 3G networks are identified and the solution for handling the cipher and integrity keys in these cases developed by the 3GPP security group, which is the relevant standardisation body.
New Block Encryption Algorithm MISTY
  • M. Matsui
  • Computer Science, Mathematics
    FSE
  • 1997
TLDR
The software implementation of MISTY1 with eight rounds can encrypt a data stream in CBC mode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively.
UMTS Sicherheitsdienste
201] 3GPP Technical Specification 35.201: Design of the UMTS Cipher and Integrity Functions
  • 201] 3GPP Technical Specification 35.201: Design of the UMTS Cipher and Integrity Functions
120] 3GPP Technical specification 33.120: UMTS Security principles and objectives
  • 120] 3GPP Technical specification 33.120: UMTS Security principles and objectives
002] 3GPP Technical Specification 29.002: Mobile Application Part (MAP) for UMTS
  • 002] 3GPP Technical Specification 29.002: Mobile Application Part (MAP) for UMTS
Zur Sicherheit digitaler Mobilfunksysteme
  • Datenschutz und Datensicherheit (DuD),
  • 1996
...
...