Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2015, Vol. 38 ›› Issue (s1): 87-91.doi: 10.13190/j.jbupt.2015.s1.020

• Reports • Previous Articles     Next Articles

Research on SQN's Security in UMTS AKA

JIA Qi-lan1,2,3, BAI Yuan1,2,3, WANG Qian1,2,3, ZHANG Hui-bing2   

  1. 1. School of Computer and Communication Engineering, Tianjin University of Technology, Tianjin 300384, China;
    2. Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guangxi Guilin 541004, China;
    3. Engineering Research Center of Communication Devices and Technology, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China
  • Received:2014-07-27 Online:2015-06-28 Published:2015-06-28

Abstract:

Three types of attacks' scenarios were described when there exists or not sequence number (SQN) in UMTS AKA. Analysis shows that the use of SQN cannot resist replay attacks effectively. Based on that, three new protocols using one-time random number were further analyzed and simulated to resist replay attacks. It is shown that AP-AKA and AKA based on public key cryptography can effectively against replay attacks. However, AP-AKA will add storage and computing resources of entities and AKA based on public key cryptography promotes the complexity of algorithm, but S-AKA only keeps against replay attacks partially.

Key words: authentication and key agreement, replay attack, sequence number, one-time rand number

CLC Number: