Abstract
Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol is proposed to improve some drawbacks of the current third-generation wireless communications. It also eliminates the need of synchronization between a mobile station and its home network. However, this paper shows that AP-AKA has some drawbacks, including the huge bandwidth consumption between foreign network and the home network, and the overhead of the stored space in the foreign network, and the overloaded home network with authentication of mobile stations. As a result, an extension of AP-AKA is proposed, which improves theses drawbacks, while preserving the superior merits of AP-AKA.
Similar content being viewed by others
References
3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, cryptographic algorithm requirements (Release 6). 3GPP TS 33.105 V6.0.0.
3rd Generation Partnership Project. (2000). Technical specification group services and system aspects, 3G security, report on the evaluation of 3GPP standard confidentiality and integrity algorithm (Release 1999). 3GPP TS 33.909V1.0.0.
3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, security architecture (Release 5). 3GPP TS 33.102 V5.5.0.
Burrows M., Abadi M., Needham R. (1990) A logic of authentication. ACM Transactions on Computer Systems 8(1): 18–36
Chang C. C., Lee J. S., Chang Y. F. (2005) Efficient authentication protocols of GSM. Computer Communications 28: 921–928
Choi, Y., & Kim, S. (2004). An improvement on privacy and authentication in GSM. In Proceedings of workshop on information security applications (WISA 2004), pp. 14–16.
Dominguez A. P. (2006) Cryptanalysis of Park’s authentication protocol in wireless mobile communication systems. International Journal of Network Security 3(3): 279–282
Huang, C. M., & Li, J. W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In 19th international conference on information networking and applications (AINA 2005) (pp. 392–397).
Juang, W. S., & Wu, J. L. (2007). Efficient 3GPP authentication and key agreement with robust user privacy protection. In IEEE communications and networking conference (WCNC2007) (pp. 2720–2725).
Lee C.-C., Hwang M.-S., Liao I. E. (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5): 1683–1687
Lee C.-C., Hwang M.-S., Liao I. E. (2008) A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communication and Mobile Computing 8: 661–672
Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings-Communications, 150(2), 91–95.
Shen J. J., Lin C. Y., Yang H. W. (2005) Cryptanalysis of a new efficient mAKEP for wireless communications. International Journal of Network Security 1(2): 118–121
Yang C. C., Chu K. H., Yang Y. W. (2006) 3G and WLAN interworking security: current status and key. International Journal of Network Security 2(1): 1–13
Zhang M., Fang Y. (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 4(2): 734–742
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was partially supported by the National Science Council, Taiwan, ROC, under contract no.: NSC100-2221-E-030-015.
Rights and permissions
About this article
Cite this article
Lee, CC., Chen, CL., Ou, HH. et al. Extension of an Efficient 3GPP Authentication and Key Agreement Protocol. Wireless Pers Commun 68, 861–872 (2013). https://doi.org/10.1007/s11277-011-0486-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-011-0486-1