12
Authentications & Key Agreement Protocols 3G/UMTS , 4G/LTE/EPS and their Enhancements By Ahmad Kabbara

LTE & UMTS Protocols + Enhancement Protocols

Embed Size (px)

DESCRIPTION

A Summary of The LTE (4G) and UMTS (3G) Authentication and Key Agreement Protocols with some Enhancements Proposed by many researchers.This Summary will be used in my Final Year Project of my Engineering Diploma. I am Working on enhancing the LTE AKA by investigating the Vulnerable and Weakned areas in the protocol and propose solutions for them.Lot to come in the next weeks, anyone interested in sharing their thoughts with me, I'll be glad to hear it.

Citation preview

Page 1: LTE & UMTS Protocols + Enhancement Protocols

Authentications & Key Agreement Protocols

3G/UMTS , 4G/LTE/EPS and their Enhancements

ByAhmad Kabbara

Page 2: LTE & UMTS Protocols + Enhancement Protocols

UMTS AKA

2/12

Page 3: LTE & UMTS Protocols + Enhancement Protocols

UMTS Security Context

3/12

Done only at initialization of the terminal

Page 4: LTE & UMTS Protocols + Enhancement Protocols

EMSUCU

4/12

Page 5: LTE & UMTS Protocols + Enhancement Protocols

Enhanced-EMSUCU(2 Solutions)

5/12

Page 6: LTE & UMTS Protocols + Enhancement Protocols

LTE - AKA

6/12

Page 7: LTE & UMTS Protocols + Enhancement Protocols

LTE – Security Context

7/12

Page 8: LTE & UMTS Protocols + Enhancement Protocols

SE - AKA

8/12

Page 9: LTE & UMTS Protocols + Enhancement Protocols

Advantages of SE - AKA:• All transmission connections between the nodes of the EPS all

secured by asymmetric cyphering.

9/12

• Vulnerable against Reject attack: Sending multiple A intercepted msgs• Vulnerable against Service Blocking(MITM): change Snid• Vulnerable against Brute Force or Intelligent Brute Force attack

against IMSI

Inconvenients of SE – AKA:

Page 10: LTE & UMTS Protocols + Enhancement Protocols

EC – AKA

10/12

Page 11: LTE & UMTS Protocols + Enhancement Protocols

EC – AKA 2

11/12

Page 12: LTE & UMTS Protocols + Enhancement Protocols

Advantages of EC – AKA:• Oppose the dictionary attack against IMSI by the generation of Dynamic IMSI

• Always guarantees to have dynamic Cyphering and Integrity Keys on each User Attach Request.

12/12

• Vulnerable against Reject Attack :by intercepting msg A.*solved by EC-AKA2

• Vulnerable against Denial of Service Attack against HSS/AuC by sending multiple A msgs.• Vulnerable against MITM Attack: Compromise the Av by knowing PKM change msg B ot B’ by changing Snid to another authorized one.

Inconvenients of EC – AKA: