期刊文献+

一种用户身份保密加强的LTE认证与密钥协商方案

LTE Authentication and Key Agreement Scheme with Enhanced User Identity Privacy
下载PDF
导出
摘要 为了保护用户身份隐私,提出一种用户身份保密加强的LTE认证与密钥协商方案。通过分析EPS AKA的具体流程以及LTE认证与密钥协商(AKA)协议机制,发现其存在安全缺陷,提出了用户身份保密AKA(UICE-AKA)方案。方案中在HSS增加RMM,用以产生RIC,以生成动态移动用户身份识别码(DMSI),设计一种LTE用户身份保密加强方案并进行安全性分析。分析结果表明:该方案有效保护了IMSI,减小了其被攻击者截获的危险性,能够进一步保护LTE中的用户身份。 In order to protect the user privacy, a LTE user identity enhanced authentication and key agreement scheme isproposed. By analyzing the specific process of EPS AKA and the mechanism of LTE AKA protocol, it is found that thereare security flaws, and the user identity secret AKA (UICE-AKA) scheme is proposed. In the scheme, the HSS is added toRMM, which is used to generate RIC, to generate dynamic mobile user identity identification code (DMSI), and to design aLTE user identity privacy enhancing scheme and security analysis. Analysis results show that the proposed scheme caneffectively protect the IMSI, reduce the risk of the attacker’s interception, and can further protect the user identity in LTE.
作者 朱诗兵 周赤 李长青 Zhu Shibing;Zhou Chi;Li Changqing(Department of Information Equipment, Academy of Equipment, Beijing 101416, China;Department of Command, Army Aviation School, Beijing 101100, China)
出处 《兵工自动化》 2016年第11期47-51,共5页 Ordnance Industry Automation
关键词 LTE AKA 用户身份保密 DMSI LTE AKA user identity confidentiality DMSI
  • 相关文献

参考文献5

二级参考文献42

  • 1王映民.TD-LTE技术原理与系统设计[M].北京:人民邮电出版社,2011.
  • 23GPP TS 33.102 V9.4.0,3rd Generation Partnership Project;Techni-calSpecification Group Servicesand System Aspects;3G Security;Securityarchitecture(Release9)[S]],2010.12.
  • 3ELKAM CH OUCH IH M,NASR M E,ABCELFATAH R I,A new se-cure and fash hashing algorithm(SFH A-256)[C]//25th NationalRadioScienceConference.Tanta:[s.n.],2008.
  • 4Boyd, Mathuria keyestablishment[M]. Berlin: SpringPress, 2003: 24-266.
  • 5Chien H Y. SASI: a new ultralightweight RFID authentication protocol providing strongauthentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
  • 6Corin R, Doumen J, Etalle S. Analyzing password protocolsecurity against off-line dictionary attacks[J]. Electronic Notes in Theoretical Computer Science, 2005, 121(4): 47-63.
  • 7Lowe G. ,nalyzing protocols subject to guessing attack. Journal of Computer Security, 2004, 12(1): 83-98.
  • 8Beljadid A, Hafid A S. Design of Wireless Mesh Networks: Expansion and Reliability Studies[C]. IEEE "GLOBECOM" proceedings, 2008: 1-6.
  • 9Ian F. Akyildiz, Wang Xudong. A Survey on Wireless Mesh Networks[J]. IEEE Radio Communications, 2005(9): 23-30.
  • 10Ricardo C. Carrano, Luiz C. S. Magalhaes, Debora C. Muchaluat Saade and C61io V. N. Albuquerque[J]. IEEE 802.11 s Multihop MAC: A Tutorial. 1EEE COMMUNICATIONS SURVEYS & TUTORIALS, 2011, 13(1): 52-66.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部