Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
|
|
|
- Madeleine Veronica Turner
- 10 years ago
- Views:
Transcription
1 Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan ABSTRACT This research work analyzes the universal mobile telecommunication system (UMTS) authentication and key agreement (AA) protocol, which suffers from the traffic bottleneck at home location register and authentication center (HLR/AuC). In addition, serving network has no capability to authenticate mobile station. To overcome these problems a new security scheme has been proposed which provides a more efficient and a secure authentication between mobile station and home networks, the proposed protocol called Efficient AA (E-AA). The E-AA uses a temporary key to enable visitor location register and serving network (VLR/SN) to authenticate mobile station (MS) without intervention of HLR/AuC. To analyze and validate the security of the proposed protocol, the BAN (Burrows, Abadi and Needham) logic is used. The results show that the E-AA protocol is more robust than the current AA protocol. eywords: 3G, Authentication, Security, Mobile Station, and BAN. 1. INTRODUCTION Authentication is used to provide security services in wireless mobile networks, it is considered as an initial process to authorize a mobile terminal for communication through secret credentials [1]. The authentication process provides a reasonable level of security, but it overloads the network with significant signalling traffic and increases the call setup time [1]. The current mechanism for security authentication in 3G system is known as AA protocol. In this mechanism a secret key (), and cryptographic algorithms are shared between MS and HN [1, 2]. The AA protocol has many weaknesses such as, the transmission between the HN and SN is usually expensive, the authentication vectors (AVs) consume network bandwidth for each transmission from authentication centre to SN [3], the storage space overhead occurs in SN, and bottleneck at HN, the HN is responsible for generating authentication vectors upon receipt of requests from all SN. Mohammad S. Saraireh Mutah University Mutah 61710, Jordan Mohammad M. AL Nabhan Jarash University Amman 11961, Jordan Responding to the weakness mentioned above, by referring to the current authentication method and improving the proposed scheme, this research work proposes a novel efficient and secure authentication scheme. Furthermore, the objective and security of the proposed scheme are analyzed by the formal analytical process of the BAN logic. This paper is organized as follows. Section 2 illustrates the UMTS AA. The literature review is presented in section 3. In section 4, the efficient and secure AA scheme is described. Formal analysis for the proposed scheme by using BAN logic is introduced in section 5. The paper is concluded in Section UMTS AA PROTOCOL In AA protocol, each MS shares secret key (), and cryptographic algorithms - include three message authentication codes f 1, f 1 *and f 2 and four key generation functions f 3, f 4, f 5 and f 5 *- with its HN [1, 4]. The goals of the UMTS AA protocol are, a mutual authentication between user and the network; an establishment of a cipher key and an integrity key; and established cipher and integrity keys [1, 4]. There are two phases in AA protocol, the first phase is the generation and distribution authentication vectors from the HN to the SN, and the second phase is the authentication and key agreement procedure between the MS and the SN [2, 5]. An overview of UMTS AA is shown in figure 1 [6]. Mobile station (MS) sends authentication request to the SN, which includes International Mobile Subscriber Identity (IMSI). SN passes this authentication request to HN. HN sends authentication data response to SN, which include authentication vector (AV). Each authentication vector has five components: random number (RAND), expected response (XRES), cipher key (C), integrity key (I) and authentication token (AUTN). The authentication vectors are ordered by the sequence number SQN HLR. The authentication vector is generated according to the following steps [6, 7]: 86
2 i. HN set SQN to SQN HN and generates RAND. ii. HN computes the following values: XRES, C, I, A, and MAC iii. HN assembles the authentication token AUTN = (SQN A AMF MAC) and the authentication vector (RAND,XRES, C, I, AUTN) iv. HN increments SQN HLR by 1. SN is receiving response from HN and then storing AV. The SN selects the i th authentication vector AV(i), and sends (RAND (i), AUTN(i)) to MS. Each authentication vector is efficient for one authentication process [6]. MS is receiving RAND and AUTN from SN. MS computes and retrieves the anonymity key A, SQN, expected message authentication code XMAC. The MS compares XMAC with MAC which is included in AUTN. If they are different, then MS sends failure message to the SN. Otherwise, MS checks that the received SQN is in the correct range. If the SQN is not in the correct range, then MS sends failure message to the SN. Otherwise, if the SQN in correct range, the MS computes RES and sends it to SN. Lately, MS computes C and I. SN is receiving authentication response from MS. SN compares the received RES with XRES in authentication vector. If RES is matching XRES, then authentications is successfully completed and select the C and I from authentication vector. If RES is unequal XRES, SN sends authentication failure to the HN. 3. RELATED WOR The UMTS AA protocol has the problem of the bandwidth consumption between SN and HN. It is attractive to choose a suitable length (L) value for AV in the third generation mobile networks. So, many techniques are developed to minimize the authentication signalling cost and network bandwidth consumption by selecting dynamic length (L) for an authentication vector [1, 5, 6, and 8]. But with this improvement by [5, 9] there are still a bandwidth consumption [6]. The technique of Lin and Chen basically estimated the number of authentication requests in current visited network based on the number in the previous visited network. Whereas the method of AL-Saraireh and Yousef, estimated the number of authentication requests in current visited network based on the history of mobile movements and the arrival rate for events [5]. Juang and Wu proposed an efficient 3GPP AA with robust user privacy. A temporary key to authenticate MS and prevent the location privacy attack is used. In this proposed protocol, the VLR initiates the authentication process by sending a random number to the MS without using any MAC. [10] Therefore denial of services (DoS) attack is possible. Additionally, the proposed protocol has seven steps. A new UMTS AA protocol called EAAP is proposed in [11]. The EAAP combines identification stage and AA stage of UMTS AA protocol. The problem in EAAP is that the size of messages between MS, VLR/SGSN and HLR/AuC is increased. Therefore; the consumption of bandwidth is occurred. Subscriber identity/location confidential and non-repudiation services are solved by [12], the proposed scheme integrates symmetric and public key cryptosystem. An Enhancement for UMTS AA protocol is proposed by Harn and Hsin used hash chaining technique instead of using AVs [9]. 4. THE EFFICENT SCHEME E-AA PROTOCOL E-AA is used to eliminate the security weakness involved with UMTS AA. E-AA is considered as a secure and an efficient authentication scheme. In the E-AA scheme VLR/SN has the capability to authenticate the user without intervention of HLR/HN. The E-AA uses a new key generation functions called f x to generate the temporary key (T). The f x function produces a 128 bits or higher bits to provide high level of security. In the proposed protocol, the SN is able to authenticate the MS after the initial authentication has been performed. The proposed authentication protocol contains two operation modes for initial and subsequent authentication. The first mode is registration and distribution of authentication information (Initial Authentication) and temporary key (T) from the HLR/HN to the VLR/SN. The second mode is the authentication and key agreement procedure (Subsequent authentication) performed between the MS and the VLR/SN. Figure 2 and 3 describe authentication mechanism for the proposed protocol. The authentication procedure is described as follow: Step 1: Authentication Request Message: When MS needs authentication to network, to access or use to use the network services, the initial authentication is carried out as follow: 1.1 MS generates random number (Rand MS ), 1.2 MS computes the Message Authentication Code MAC MS = f 1 (, Rand MS ), 1.3 MS sends IMS, Rand MS and MAC MS as authentication request to VLR/SN. Step 2: Authentication Request Message: 87
3 VLR/SN passes this authentication request to HLR/HN. Step 3: Authentication Response Message: Receiving the authentication request and then verification procedure is performed by HLR/HN. A response message is generated. The following operations are carried by HLR/HN: 3.1 Compares and computes expected message authentication code for mobile station (XMAC MS ) to verify the received message. XMAC MS =f 1 (, Rand MS ) XMAC MS?= MAC Ms If mismatching occurs then the registration will fail otherwise it will execute the next steps. 3.2 Generates SQN HLR and RAND HLR. 3.3 Computes expected response XRES HLR = f 2 (,RAND HLR ), Anonymity ey A HLR = f 5 (,RAND HLR ), Message Authentication Code MAC HLR = f 1 (,SQN RAND HLR MAF), where MAF is Message Authentication Field and authentication token AUTN HLR = (SQN A HLR AMF MAC HLR ) where is exclusive OR operation. 3.4 Computes temporary key T = f x (,RAND HLR ). 3.5 Sets response messages and sends it to VLR/SGSN, including one authentication vector AV. This AV consists of four components: RAND HLR, XRES HLR, T and AUTN HLR. AV = RAND HLR XRES HLR T AUTN HLR Step 4: Authentication Response Message: Receiving the response message from HLR/HN, VLR/SN will invoke the authentication to the MS. VLR/SN will achieve the following: 4.1 Stores the T, AUTN HLR and generates Rand VLR. 4.2 Computes MAC VLR =f 1 (T, MAC HLR Rand VLR ) where the MAC HLR retrieved from AUTN HLR which stored in previous step. 4.3 Computes AUTN VLR = (SQN HLR A HLR AMF MAC VLR ) 4.4 VLR/SN sends AUTH VLR, Rand VLR and Rand HLR to MS Step 5: Authentication Response Message: When MS receives the messages, the MS will achive the following: 5.1 Computes T=f x (, Rand HLR ). 5.2 Verifies that the received sequence number SQN is in the correct range. If the MS considers the sequence number to be not in the correct range, it sends synchronization failure back to the VLR/SN including an appropriate parameter, and abandons the procedure. 5.3 Computes XMAC for HLR and VLR. XMAC HLR = f 1 (, A MS (SQN HLR A HLR ) Rand HLR AMF) where Rand HLR and AMF are retrieved from AUTN VLR XMAC VLR = f 1 (T,XMAC HLR Rand VLR ). If XMAC VLR is equal XMAC VLR then HLR/HN and VLR/SN are valid, 5.4 Computes an XRES = f 2 (T, Rand VLR ) 5.5 Sends XRES to VLR/SN. While, the MS computes an integrity key as I = f 3 (T, Rand VLR ) and a cipher key as C = f 4 (T, Rand VLR ) to realize securely communication with VLR/SN subsequently. Step 6: Authentication Response Message: VLR/SN receives the messages from MS and verifies whether RES is identical to the XRES. If it is true, the whole authentication is successfully completed. If it is false, the authentication is failed. After the initial authentication, both the VLR/SN and MS obtain the authentication result from the HLR/HN and share some secret information. Here, the VLR/SN caches some authentication information, which can be used in subsequent authentication without intervention of HLR/HN. After initial authentication, the VLR/SN has the ability to authenticate the MS in subsequent authentication. If the MS remains in the same VLR/SN and requests services, then the user should ask for subsequent authentication. MS similarly generates an authentication request message, which should contain the information shared between the MS and VLR/SN; the VLR/SN uses this information to authenticate the MS. VLR/SN authenticates MS by using temporary key T. As mentioned above, the VLR/SN has cached information needed to authenticate MS. After authenticating the MS, the VLR/SN sends a response message containing the authentication result to the MS. The MS receives the response message and learns whether the authentication was successful or not. The subsequent authentication is described as follows: Step 1: Authentication Request Message MS sends authentication request to VLR/SN Step 2: Authentication Request Message When VLR/SN receives the request message, VLR/SN will do the following: 2.1 Generates Rand VLR 2.2 Computes authenticate token AUTN = SQN A AMF MAC Where A = f 5 (T,RAND), and MAC = f 1 (T,SQN RAND MAF). 88
4 2.3 Sends AUTN and RAND to MS. Step 3: Authentication Response Message When MS receives the response message, MS will achieve the following: 3.1 Computes and retrieves the A = f 5 (T, Rand), SQN =( (SQN A) A), and XMAC = f 1 (SQN, RAND, AMF) 3.2 Compares XMAC with MAC which is included in AUTN. If XMAC is not equal to MAC then MS sends failure message to the VLR/SN, else if XMAC is equal MAC then MS checks that the received SQN is in the correct range i.e. SQN > SQN MS. If SQN is not in the correct range then MS sends failure message to the VLR/SN, else if it is in the correct range, then MS computes the Response RES = f 2 (T, RAND), and C = f 3 (T, Rand). After that, it sends RES to VLR/SN. Step 4: Authentication Response Message VLR/SN receives the messages from MS and verifies whether RES is identical to the XRES. If it is true, the whole authentication is successfully completed. If it is false, the authentication is failed. 5. FORMAL ANALYSIS OF E-AA BAN logic represents a powerful tool to describe and validate authentication protocols. In this research work BAN logic is used to formalize and prove the security of the proposed protocol. BAN Logic [13] is a formal method for verifying that two principles (MS, VLR/SN, HN/HLR) are entitled to believe they are communicating with each other. It is based on an agreed set of deduction rules for formally reasoning about the authentication protocols and is often referred to as logic of authentication [7, 13, and 14] BAN LOGIC NOTATION AND DEDUCTION RULES The definitions of BAN logic and their implications are presented below (P and Q are network agents, X is a message, and is an encryption key) [7, 13, and 14]: - P X : Denotes that P believes X. P may act as though X is true. - P < X : Denotes that P sees X. Someone has sent P a message containing X. P can read X and can repeat it in other messages. - #( X ) : Denotes that X is fresh. X has not been sent in a message at any time before the current run of the protocol. - P X : Denotes that P control X; P has jurisdiction over X. P is a trusted authority on the truth of X. - P ~ X : Denotes that P said X. At one time, P transmitted (and believed) message X, although P might no longer believe X. - P Q ~ ( X, Y ) / P Q ~ X : - P Q : Denotes that is a good shared key for communication between P and Q, and it will never be discovered by any principal except for P or Q. - a P : Denotes that is the public key of P. - { X} : Denotes that X is encrypted with key. P - : Means if P is true then Q is true. Q Some deduction rules that are used in the analysis of proposed scheme are described as follow [7, 14, and 15]: - Message meaning rules: this rule concerns the interpretation of messages. This rule helps to explain the origin of the messages. For shared keys: P P Q, P Q ~ X - Nonce verification rules: this rule checks that a message is recent, and also checks if the sender still believes P # ( X ), P Q ~ X in it. P Q X - Jurisdiction rules: This rule states what it means for a principal to be the trusted authority on the truth of X. P Q X, P Q X P X - Seeing rules: This rule says that a principal sees all the components of every message it sees, provided that the principal knows the necessary key P < ( X, Y ) P < ( X ) P P Q, P < X - Belief rules: The rule states that a principal believes a collection of statements if and only if it believes 89
5 each of the statements individually. P ( X, Y ) P ( X ) The following steps of BAN logic has been used to analyze the proposed protocol: i. The proposed protocol is transformed into idealized form ii. Identify our initial assumptions in the language of BAN logic iii. Use the postulates and rules of the logic to deduce new predicates iv. Interpret the proved statements by the process? Have the goals met? 5.2. SECURITY PROOF By using the notation and deduction rules in section 5.1, the protocol security can be proved. The original version of the proposed scheme without idealization form is as following: Message 1 MS VLR / SN : IMSI, Rand, MAC MS MS Message 2 VLR / SN HLR / HN : IMSIRand,, MAC MS MS Message 3 HLR / HN VLR / SN : Rand XRES R, T, HL HLR, AUTH HLR Message 4 VLR / SN MS: RandVLR, RandHLR, AUTH Step 1: Idealized Form: The ideal form of protocol using BAN logic is: HLR HN < ( IMSI, Rand Ms, MAC ) VLR / MS / SN ( RandHLR, XRESHLR, T, AUTHHLR ( RandVLR, Rand HLR, AUTHVLR ) VLR < MS < Step 2: Initial Hypothetical: The initial supposition on the protocol as follows: MS HLR / HN The temporary key is used in proposed E-AA protocol to reduce the traffic between HLR/AuC and Step 3: Final Goal Set: MS MS HLRHN / ( G1) T MS MS VLRSN / ( G2) Step 4: Form Analysis of Proposed Protocol: According to initial assumption MS HLR / HN and message meaning P P Q, rule, it can P Q ~ X be deduced the first goal as follows: ) MS HLR / HN ~ XMAC HLR, Use MAC MS = XMAC HLR to obtain the following MS MS HLR / HN which is the first goal (G1) To deduce the second goal (G2): T MS VLR / SN. By using the following three rules 1. First goal MS MS HLR / HN and 2. Seeing rule: P P Q, and P < X 3. Jurisdiction rule: P Q X, P Q X P X to obtain MS < XMC VLR / SN, use MS VLR / SN ~ MAC VLR and MAC VLR = XMAC VLR to obtain the T following: MS VLR / SN which is the second goal (G2). According to the given analysis, the proposed protocol can be considered secure. 5. CONCLUSION In this research work, the current UMTS authentication and key agreement protocol have been analyzed, and showed that it has set of weaknesses. The new authentication scheme provides a solution for these weaknesses. The proposed protocol provides a mutual authentication between mobile station and its home network and serving network. The signalling traffic is reduced between home network and serving network by using temporary key. The serving network has capabilities to authenticate mobile station without intervention from home network. The proposed protocol has been improved and formalized by using BAN logic. 6. REFERENCES 1. Al-Saraireh J. & Yousef S., (2006) A New Authentication Protocol for UMTS Mobile Networks, EURASIP Journal on wireless communications and networking, Vol. 2006, pp
6 2. Zhang M. & Fang Y., (2005) Security Analysis and Enhancements of 3GPP Authentication and ey Agreement Protocol, IEEE Transactions on wireless communications, Vol. 4, No. 2, pp Lin Y & Chen Y., (2003) Reducing Authentication Signaling Traffic in Third-Generation Mobile Network, IEEE Transactions on Wireless Communications, Vol. 2, No. 3, pp Huang Y., Shen Y., Shieh S., Wang H. & Lin C., (2009) Provable Secure AA Scheme with Reliable ey Delegation in UMTS, Secure Software Integration and Reliability Improvement, SSIRI Third IEEE International Conference, Vol. 2009, pp Al-Saraireh J. & Yousef S., (2007) Analytical Model: Authentication Transmission Overhead between Entities in Mobile Networks, Elsevier, Computer Communications Journal, Vol. 30, No. 9, pp Al-Saraireh J., (2011) Efficient and Secure Authentication and ey Agreement Protocol, International Journal of UbiCom (IJU), Vol. 2, No Li H., Guo S., Zheng., Chen Z. & Cui J., (2009) Improved Adoptable Scheme for Authentication and ey Agreement, IEEE International Conference on Management and Service Science (MASS 2009), pp. 1-4, print ISBN: , DOI: /ICMSS GPP TS V8.0.0, (2008) 3GPP Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 8), 3 rd Generation Partnership Project. 9. Harn L. & Hsin W., (2003) On the security of wireless network access with enhancements, in Proceedings of the 2003 ACM workshop on Wireless security, San Diego, USA, Sep , pp Juang W.S. & Wu J.L., (2007) Efficient 3GPP Authentication and ey Agreement with Robust User Privacy Protection, IEEE Communications Society, Proceedings of the WCNC. 11. Farhat F., Salimi S. & Salahi A., (2009) An Extended Authentication and ey Agreement Protocol of UMTS, Information Security Practice and Experience, Lecture Notes in Computer Science, Vol. 5451/2009, pp , DOI: / _ Min-Shiang H., Song-ong C. & Hsia- Hung O., (2010) On the security of an enhanced UMTS authentication and key agreement protocol, European Transactions on Telecommunications. DOI: /ett Burrows M., Abadi M., & Needham R., (1989) A logic of Authentication, Digital Systems Research Center. 14. Zhang J., Chen G., & Deng F., (2008) A New Mutual Authentication and ey Agreement Protocol for Mobile Communications, International Conference on Wireless Communications, Networking and Mobile Computing (IEEE WICOM 2008), pp ISBN , DOI: /WiCom Chang C., Pan H., Jia H., (2008) A Secure Message Communication Protocol. International Journal of Automation and 91
7 MS VLR/SGSN HE/HLR Distribution of Authentication 1. Authentication Data Request (IMSI) 2. Authentication Data Response Authentication & ey 3. User Authentication Request (RAND i, 4. User Authentication Response (RES) Figure 1: The Authentications and key agreement protocol. MS VLR/SN HLR/HN IMSI, Rand MS, MAC MS Initail Authentication and Create Temporary ey IMSI, RandMS, MACMS XMAC MS?= MAC MS XRES HLR = f 2(,RAND HLR) T=f x(,rand HLR), A HLR=f 5(,Rand HLR) MAC HLR=(, SQN Rand HLR MAF) AUTN HLR = (SQN A HLR AMF MAC HLR) Authentication & ey Establishment Authentication Data Response XMAC HLR?= MAC HLR AV=(Rand HLR XRES HLR T AUTN HLR) XMAC VLR?= MAC VLR Store T, AUTN HLR, compute MAC VLR=f 1(T, MAC HLR Rand VLR) XRES=f 2(T,Rand VLR) T=f x(,rand HLR) AUTN VLR = (SQN HLR A HLR AMF MAC VLR) Authentication Data Response AUTN VLR, Rand VLR, Rand HLR User Authentication Response (RES) Compare RES?= XRES Figure 2 Registration and distribution of authentication information (Initial Authentication) in EAA MS VLR/SN HLR/HN TIMSI AUTN, RAND Generates Rand VLR MAC=f1(T,SQN RAND MAF) AUTN = (SQN A AMF MAC) A=f 5(T,Rand) Compute A Compare MAC?= XMAC Compare SEQ with SEQ MS Compute RES, C, I User Authentication Response (RES) Compare RES?= XRES Figure 3 Subsequent authentications in EAA 92
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Security Evaluation of CDMA2000
Security Evaluation of CDMA2000 L. Ertaul 1, S. Natte 2, and G. Saldamli 3 1 Mathematics and Computer Science, CSU East Bay, Hayward, CA, USA 2 Mathematics and Computer Science, CSU East Bay, Hayward,
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Joe-Kai Tsay and Stig F. Mjølsnes Department of Telematics Norwegian University of Sciences and Technology, NTNU {joe.k.tsay,[email protected]}
ETSI TS 133 102 V3.6.0 (2000-10)
TS 133 102 V3.6.0 (2000-10) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Security Architecture (3GPP TS 33.102 version 3.6.0 Release 1999) 1 TS 133 102 V3.6.0
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Authentication and Authorization Applications in 4G Networks
Authentication and Authorization Applications in 4G Networks Abstract Libor Dostálek [email protected] Faculty of Science University of South Bohemia Ceske Budejovice, Czech Republic The principle of
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Security Architecture Standardization and Services in UMTS
Security Architecture Standardization and Services in UMTS Christos Xenakis and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications University of Athens, 15784
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext
Part 2 Plaintext M Encrypt with public key E(M, K) Ciphertext Plaintext M D(E(M, K),K ) Decrypt with private key E(M, K) Public and private key related mathematically Public key can be published; private
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
On the Security of 3GPP Networks
On the Security of 3GPP Networks Michael Walker Vodafone AirTouch & Royal Holloway, University of London Chairman 3GPP SA3 - Security Eurocrypt 2000 Security of 3GPP networks 1 Acknowledgements This presentation
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
IMSI Catcher. Daehyun Strobel. 13.Juli 2007. Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.
IMSI Catcher Daehyun Strobel 13.Juli 2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 GSM (Global System for Mobile
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra
Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC-04-002 27 de febrero de 2004 Coordinación de Ciencias Computacionales
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Mobility Management usually includes two parts: location management and handoff management.
Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems Changgeng Yu; Liping Lai School of Mechanical and Electronic Engineering, Hezhou University, No.8, xihuan Road,
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. secure data communication. The access point periodically advertise
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices
ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices Document ID: 119148 Contributed by Krishna Kishore DV, Sujin Anagani, and Parthasarathy M, Cisco TAC Engineers. Jun 12, 2015 Contents
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
ETSI TS 133 203 V5.1.0 (2002-03)
TS 133 203 V5.1.0 (2002-03) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services (3GPP TS 33.203 version 5.1.0 Release 5) 1 TS 133
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Anonymous Mobile Conference Calls
Anonymous Mobile Conference Calls N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science University of Pretoria Pretoria South Africa
Providing Security in 4G Systems: Unveiling the Challenges
Providing Security in 4G Systems: Unveiling the Challenges Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae School of Engineering and Information Science Middlesex University London, UK {M.Aiash, G.Mapp,
ETSI TR 133 919 V6.1.0 (2004-12)
TR 133 919 V6.1.0 (2004-12) Technical Report Universal Mobile Telecommunications System (UMTS); Generic Authentication Architecture (GAA); System description (3GPP TR 33.919 version 6.1.0 Release 6) 1
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Network Security. Chapter 14. Security Aspects of Mobile Communications
Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication
Modeling and verification of security protocols
Modeling and verification of security protocols Part I: Basics of cryptography and introduction to security protocols Dresden University of Technology Martin Pitt [email protected] Paper and slides available
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
Mobile Banking in Developing Countries: Secure Framework for Delivery of SMS-banking Services MASTER THESIS
Mobile Banking in Developing Countries: Secure Framework for Delivery of SMS-banking Services MASTER THESIS Author: Abunyang Emmanuel Student Number: s0535249 Radboud University Nijmegen. The Netherlands
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Third Party Data Session Control in the Evolved Packet System
Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA [email protected]
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Trust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS
A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS Azita Laily Yusof, Mahamod Ismail, Norbahiah Misran Dept of Electrical, Electronic & System Engineering, Universiti Kebangsaan
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
Q: Why security protocols?
Security Protocols Q: Why security protocols? Alice Bob A: To allow reliable communication over an untrusted channel (eg. Internet) 2 Security Protocols are out there Confidentiality Authentication Example:
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
DoS Attacks Exploiting Signaling in UMTS and IMS
DoS Attacks Exploiting Signaling in UMTS and IMS 1 Georgios Kambourakis, 1 Constantinos Kolias, 1 Stefanos Gritzalis, 2 Jong Hyuk Park 1 Laboratory of Information and Communication Systems Security Department
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
ETSI TS 131 104 V11.1.0 (2012-10)
TS 131 104 V11.1.0 (2012-10) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Characteristics of the Hosting Party Subscription Identity Module (HPSIM) application (3GPP
