Click here to load reader

LTE & UMTS Protocols + Enhancement Protocols

  • View

  • Download

Embed Size (px)


A Summary of The LTE (4G) and UMTS (3G) Authentication and Key Agreement Protocols with some Enhancements Proposed by many researchers.This Summary will be used in my Final Year Project of my Engineering Diploma. I am Working on enhancing the LTE AKA by investigating the Vulnerable and Weakned areas in the protocol and propose solutions for them.Lot to come in the next weeks, anyone interested in sharing their thoughts with me, I'll be glad to hear it.

Text of LTE & UMTS Protocols + Enhancement Protocols

  • 1. Authentications & Key Agreement Protocols 3G/UMTS , 4G/LTE/EPS and their Enhancements By Ahmad Kabbara

2. UMTS AKA2/12 3. UMTS Security Context Done only at initialization of the terminal3/12 4. EMSUCU4/12 5. Enhanced-EMSUCU(2 Solutions)5/12 6. LTE - AKA6/12 7. LTE Security Context7/12 8. SE - AKA8/12 9. Advantages of SE - AKA: All transmission connections between the nodes of the EPS all secured by asymmetric cyphering.Inconvenients of SE AKA: Vulnerable against Reject attack: Sending multiple A intercepted msgs Vulnerable against Service Blocking(MITM): change Snid Vulnerable against Brute Force or Intelligent Brute Force attack against IMSI9/12 10. EC AKA10/12 11. EC AKA 211/12 12. Advantages of EC AKA: Oppose the dictionary attack against IMSI by the generation of Dynamic IMSI Always guarantees to have dynamic Cyphering and Integrity Keys on each User Attach Request.Inconvenients of EC AKA: Vulnerable against Reject Attack :by intercepting msg A.*solved by ECAKA2 Vulnerable against Denial of Service Attack against HSS/AuC by sending multiple A msgs. Vulnerable against MITM Attack: Compromise the Av by knowing PKM change msg B ot B by changing Snid to another authorized one. 12/12