4.5 Article

An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 31, Issue 3, Pages 1101-1116

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2022.3207360

Keywords

Authentication; Security; Protocols; Long Term Evolution; Elliptic curve cryptography; Elliptic curves; Handover; LTE; EPS-AKA; self-certified public keys; authentication; key agreement protocol

Ask authors/readers for more resources

This paper analyzes the security vulnerabilities of the LTE authentication and key agreement process (EPS-AKA) and proposes an ECC self-certified authentication key agreement scheme (ESC-AKA) based on elliptic curve cryptography (ECC) self-certified public keys. The scheme includes the addition of a trusted center (TC) and three communication protocols. A strand space model is used for formal analysis, and performance and security analyses are conducted. The results show that this scheme can effectively address the security vulnerabilities of the original EPS-AKA scheme and protect the communication security of the LTE network.
After analyzing the long-term evolution (LTE) authentication and key agreement process (EPS-AKA), its existing security vulnerabilities are pointed out. Based on elliptic curve cryptography (ECC) self-certified public keys, this paper proposes an ECC self-certified authentication key agreement scheme (ESC-AKA). This scheme includes the addition of a trusted center (TC), which generates the public keys for the home subscriber server (HSS), the mobility management entity (MME), and the user equipment (UE). Three communication protocols are designed, including MME/HSS registration, UE registration, and UE access. A strand space model is used to carry out the formal analysis, and performance and security analyses are carried out. The results show that this scheme can compensate for the security vulnerabilities of the original EPS-AKA scheme. It implements the encrypted transmission of the international mobile subscriber identity (IMSI), and realizes the mutual authentication between the HSS and MME, the MME and UE, and the HSS and UE. Because the self-certified public key cryptosystem is adopted in this scheme, communication encryption is ensured, and the risk of the TC simultaneously mastering the public and private keys is avoided. This scheme is proven to be effective in protecting the communication security of the LTE network.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available