Skip to main content
Log in

Extension of an Efficient 3GPP Authentication and Key Agreement Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol is proposed to improve some drawbacks of the current third-generation wireless communications. It also eliminates the need of synchronization between a mobile station and its home network. However, this paper shows that AP-AKA has some drawbacks, including the huge bandwidth consumption between foreign network and the home network, and the overhead of the stored space in the foreign network, and the overloaded home network with authentication of mobile stations. As a result, an extension of AP-AKA is proposed, which improves theses drawbacks, while preserving the superior merits of AP-AKA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, cryptographic algorithm requirements (Release 6). 3GPP TS 33.105 V6.0.0.

  2. 3rd Generation Partnership Project. (2000). Technical specification group services and system aspects, 3G security, report on the evaluation of 3GPP standard confidentiality and integrity algorithm (Release 1999). 3GPP TS 33.909V1.0.0.

  3. 3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, security architecture (Release 5). 3GPP TS 33.102 V5.5.0.

  4. Burrows M., Abadi M., Needham R. (1990) A logic of authentication. ACM Transactions on Computer Systems 8(1): 18–36

    Article  Google Scholar 

  5. Chang C. C., Lee J. S., Chang Y. F. (2005) Efficient authentication protocols of GSM. Computer Communications 28: 921–928

    Article  Google Scholar 

  6. Choi, Y., & Kim, S. (2004). An improvement on privacy and authentication in GSM. In Proceedings of workshop on information security applications (WISA 2004), pp. 14–16.

  7. Dominguez A. P. (2006) Cryptanalysis of Park’s authentication protocol in wireless mobile communication systems. International Journal of Network Security 3(3): 279–282

    MathSciNet  Google Scholar 

  8. Huang, C. M., & Li, J. W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In 19th international conference on information networking and applications (AINA 2005) (pp. 392–397).

  9. Juang, W. S., & Wu, J. L. (2007). Efficient 3GPP authentication and key agreement with robust user privacy protection. In IEEE communications and networking conference (WCNC2007) (pp. 2720–2725).

  10. Lee C.-C., Hwang M.-S., Liao I. E. (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5): 1683–1687

    Article  Google Scholar 

  11. Lee C.-C., Hwang M.-S., Liao I. E. (2008) A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communication and Mobile Computing 8: 661–672

    Article  Google Scholar 

  12. Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings-Communications, 150(2), 91–95.

  13. Shen J. J., Lin C. Y., Yang H. W. (2005) Cryptanalysis of a new efficient mAKEP for wireless communications. International Journal of Network Security 1(2): 118–121

    Google Scholar 

  14. Yang C. C., Chu K. H., Yang Y. W. (2006) 3G and WLAN interworking security: current status and key. International Journal of Network Security 2(1): 1–13

    MathSciNet  Google Scholar 

  15. Zhang M., Fang Y. (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 4(2): 734–742

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Chi Lee.

Additional information

This research was partially supported by the National Science Council, Taiwan, ROC, under contract no.: NSC100-2221-E-030-015.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, CC., Chen, CL., Ou, HH. et al. Extension of an Efficient 3GPP Authentication and Key Agreement Protocol. Wireless Pers Commun 68, 861–872 (2013). https://doi.org/10.1007/s11277-011-0486-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0486-1

Keywords

Navigation