User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System

  title={User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System},
  author={Mohammed Ramadan and Fagen Li and Chunxiang Xu and Abdeldime Mohamed and Hisham Abdalla and Ahmed Abdalla Ali},
  journal={Int. J. Netw. Secur.},
Long Term Evolution LTE is the first technology that provides exclusively packet-switched data and modifies the security architecture of the 2G and 3G systems. The LTE security architecture offers confidentiality, access control, a kind of obscurity and mutual authentication. However, numerous types of attacks can be encountered during the mutual authentication process which is a challenge-response based technique. Therefore, a high secure public key algorithm can be implemented to improve the… 

Figures and Tables from this paper

An efficient end-to-end mutual authentication scheme for 2G-GSM system

This paper analyses an existing GSM authentication scheme based on CL-PKC and proposes an efficient end-to-end scheme for GSM mutual authentication using the concept of a secure CL- PKC, with some modifications in both security and GSM network architectures.

PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks

The proposed performance and security enhanced (PSE-AKA) protocol follows the cocktail therapy to generate the authentication vectors that improves the performance in terms of computation and communication overhead and reduces the bandwidth consumption from the network.

Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design

Experimental results show that Pairing-Free Identity-Based Mutual Authentication and Key Agreement attains significantly less computational and communication cost when compared to User-to-User Mutual authentication and Key agreement scheme.

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems

The performance evaluation and security analysis demonstrate that the proposed IBS-SAV scheme is not only secure but also can reduce the communication and computation complexity for mobile systems efficiently.

A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications

Evaluations of the proposed protocol show that it can withstand various known types of attacks, and also satisfies essential functionality requirements, and efficiency analyses show that the protocol is simple and cost-efficient.

Analysis of security threats and protocols for LTE networks

  • Amandeep SinghC. Singh
  • Computer Science
    2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
  • 2017
Various security aspects for Long Term Evolution (LTE) networks have been reviewed in terms of authentication techniques, key management system, effects of attacks, etc.

A Generic Construction for Efficient and Secure AKA Protocol in 5G Network

  • Computer Science
    2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
  • 2018
The generic construction for efficient and secure AKA protocol in the 5G network is proposed and the security analysis illustrates that the protocol fulfills all the security requirements and is secure against the known attacks.

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.



S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks

The formal proof of the S-AKA protocol is given to guarantee its robustness and can reduce bandwidth consumption and the number of messages required in authenticating mobile subscribers.

End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

In the proposed protocol, each mobile user can choose a password and when two mobile users want to communicate with each other, either user can request to perform a end-user identification process.

Enhanced Authentication and Key Agreement Procedureof Next Generation 3GPP Mobile Networks

This research explains evolved authentication and key agreement protocol for next generation Long term evolution/ System Architecture Evolution( LTE/SAE )networks and compared its enhancements with contrast to Universal Mobile Terrestrial SystemAuthentication and Key Agreement ( UMTS-AKA) offers a new improvement protocol which increases performance of authentication procedure.

A Location Privacy Preserving Authentication Scheme in Vehicular Networks

This paper proposes a location privacy preserving authentication scheme based on blind signature in the elliptic curve domain that cannot only provide fast authentication, but also guarantee the security and location anonymity to the public.

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography

Preliminary analysis indicates that SFRIC can complete the roaming authentication within a period much less than the critical 20 ms threshold, required for maintaining streaming traffic, when the cryptographic operations are performed in hardware.

Mutual entity authentication for LTE

  • G. M. Køien
  • Computer Science
    2011 7th International Wireless Communications and Mobile Computing Conference
  • 2011
This paper proposes an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol, and analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Security Analysis of LTE Access Network

This paper reviews the access network components, the eNodeB security requirements, as defined by 3GPP and analyzes two secure access mechanisms to a 4G network, one via eNB (3GPP access type) and the other one via AP (non-3G PP access type).

An efficient handover authentication scheme with location privacy preserving for EAP-based wireless networks

This paper integrates an efficient ring signature and a proxy signature into a proxy ring signature scheme, which allows the mobile node (MN) to be authenticated without revealing its identity and location privacies due to the inherent anonymity of theproxy ring signature.

Authenticated Encryption Schemes: Current Status and Key Issues

The evolution and the existed problems of authenticated encryption schemes are discussed and the scheme is very suitable for the key agreement application, because a key is a small amount of a message.