An Efficient Authentication and Key Agreement Protocol For 4G (LTE) Network 2014
An Efficient Authentication and Key Agreement Protocol For 4G (LTE) Network 2014
Abstract—Long Term Evolution (LTE) networks designed networks leads to exponential proliferation of vulnerabilities,
by 3rd Generation Partnership Project (3GPP) represent a deficiencies, eavesdroppers and attacks, hence, the wireless
widespread technology. LTE is mainly influenced by high data security management becomes encouraging environment for
rates, minimum delay and the capacity due to scalable bandwidth a large number of studies and research. The authentication
and its flexibility. With the rapid and widespread use LTE and key agreement protocol is an important component in
networks, and increase the use in data/video transmission and
the LTE networks, and plays a key role in the security in
Internet applications in general, accordingly, the challenges of
securing and speeding up data communication in such networks such networks. The 3GPP project continues in evaluating
is also increased. Authentication in LTE networks is very impor- and developing the AKA protocol as a part of the 3GPP’s
tant process because most of the coming attacks occur during security system. Starting from 2G-AKA [1], 3G-AKA [2]
this stage. Attackers try to be authenticated and then launch or UMTS-AKA and reaching to EPS-AKA [3] for 4G
the network resources and prevent the legitimate users from networks. The 3G-AKA has been developed based on 2G
the network services. The basics of Extensible Authentication security mechanism to meet the requirements of 3G networks
Protocol-Authentication and Key Agreement (EAP-AKA) are and to overcome the deficiencies of 2G-AKA protocol.
used in LTE AKA protocol which is called Evolved Packet However, there are some deficiencies such as tapping users
System AKA (EPS-AKA) protocol to secure LTE network, identity and difficulty of sequence numbers, etc. Recently,
However it still suffers from various vulnerabilities such as
3GPP has adopted EPS-AKA protocol for the next generation
disclosure of the user identity, computational overhead, Man In
The Middle (MITM) attack and authentication delay. In this networks LTE. The framework of 3G-AKA is retained with
paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed improvements in security and performance. The Access
to overcome those problems. The proposed protocol is based Security Management Entity (ASME) is hosted in the Mobile
on the Simple Password Exponential Key Exchange (SPEKE) Management Entity (MME) to provide access security and to
protocol. Compared to previous proposed methods, our method be considered as a key distributor in the EPS-AKA protocol.
is faster, since it uses a secret key method which is faster Despite its safety and efficacy, EPS-AKA does not provide
than certificate-based methods, In addition, the size of messages full protection for LTE networks and suffers from several
exchanged between User Equipment (UE) and Home Subscriber drawbacks such as user identity attacks, communication cost,
Server (HSS) is reduced, this reduces authentication delay and and bandwidth consumption. The user identity can be revealed
storage overhead effectively. The automated validation of internet
when the International Mobile Subscriber Identity (IMSI) is
security protocols and applications (AVISPA) tool is used to
provide a formal verification. Results show that the proposed sent in clear text in the first connection, which allows user
EEPS-AKA is efficient and secure against active and passive identity attack, MME can not retrieve IMSI using the Globally
attacks. Unique Temporary Identity (GUTI), when visiting a new
MME, or when a fake eNB request IMSI from UE [4]. Many
Keywords—LTE, EPS-AKA, SPEKE, EEPS-AKA.
solutions and protocols have been proposed in several studies
to address those drawbacks, and improve the performance
I. I NTRODUCTION of EPS-AKA, but there has been no a perfect solution so
The Third Generation Partnership Project (3GPP) started far. Unlike the previous solutions where the public key
in November 2004 to define the long-term evolution of Infrastructure (PKI) and certificate-based solutions have been
the Universal Mobile Telephone System (UMTS) which used, a shared key mechanism is used in this work, and lead
was also one of 3GPP projects. The 3GPP has many other to a decrease in the authentication delay and communication
projects such as High Speed Downlink Packet Access cost. In this paper, we present the limitations of previous
(HSPDA), High Speed Uplink Packet Access (HSUPA), works in EPS-AKA mechanism, then, an efficient EPS-AKA
Time-Division Synchronous Code Division Multiple Access protocol is proposed using a simple and strong mechanism
(TD-SCDMA), System Architecture Evolution(SAE) and based on SPEKE protocol with some improvements to be
Long Term Evolution(LTE) release 8. The next step of LTE is adapted with LTE architecture. The shared secret key is not
LTE release 10 or LTE-Advanced where multiple carriers have exchanged, instead it is computed using a strong method in
been aggregated to provide wider bandwidth and improved UE and Home Subscriber Server (HSS) and used to protect
antenna technologies have been used in both direction uplink the IMSI.
and downlink. The widespread use of 4th Generation (4G)
networks leads to more needs of high bit rate, less delay The remainder of this paper is organized as follows. Sec-
in such networks. Moreover the wireless nature in the LTE tion II discusses in some depth the overview of EAP protocol
overcome those vulnerabilities. The proposed method prevents by Kum and Kuh keys. To provide perfect forward secrecy,
reply, MITM attacks by using timestamp and authenticating the secret key is used also to compute the generated keys in
AP and it provides user privacy by using a temporary user the later steps such as (IK, CK, MSK). The details of the
identity, however verifying the solutions provided is required. proposed method is in Figure 4 and the following steps:
An enhancements on AKA protocol called Enhancement
Mobile Security and User Confidentiality (EMSUCU ) for 1) MME computes B = g m mod p, and attaches B to
UMTS have been proposed in [10] to overcome some problems the user identity request message which sent to UE via
such as user identity disclosure and secret key exposure. The eNB.
idea of EMSUCU protocol is to encrypt the permenant identity 2) UE computes A = g u d mod p, and uses the received
of UE (IMSI) and use the encrypted IMSI whenever the B to compute the symmetric shared key Kum = B u
temporary IMSI can not be used. the new protocol enhanced mod p which is computed in UE and MME, then
EMSUCU in some aspects such as, using hash function instead it Chooses a random nonce Ru , and uses key Kum
of encryption functions to speed up the procedure, increasing with function f to compute PIMSI, where P IM SI
the level of security by increasing the size of key (Kc) by = fKum (IM SI, Ru), and then, it sends the message
using new security function f11 to generate the key Kc that A, P IM SI, Ru to MME.
used to encrypt the IMSI, eliminating the use of the shared 3) Upon receipt user identity response message, MME
key and protecting the exchanged message of AKA protocol computes the shared key Kum = Am mod p, and
that contains (RAND, RES, AUTN, CK, IK). forwards Kum , P IM SI, Ru to HSS server. It also
In the same subject, the work in [11], has studied the EPS- computes the shared key Kuh , which is computed in
AKA protocol and addressed some issues such as user identity UE and HSS, Kuh = Kum ⊕ K, K is pre-shared key
and how to protect the users from malicious MME. The authors between UE and HSS.
proposed a modified AKA protocol called hybrid scheme 4) The HSS checks the IMSI and retrieves the corre-
HSK-AKA based on the method proposed in [12]. HSK-AKA sponding key for the UE, It also checks the received
protocol minimizes using of public key cryptography by using value Ru with the value retrieved from PIMSI, then
it in digital signature and using symmetric key cryptography in it computes key Kuh , which is computed in UE and
USIM functions to reduce the energy consumption. It achieves HSS, Kuh = Kum ⊕ K, K is pre-shared key between
better performance compared to some protocols such as SE- UE and HSS. After that it chooses random value
AKA [13] in terms of computational overhead and delay as Rh, uses Kuh and Rh to generate HSS Verification
well as fulfill the security requirements. value (HSSV) and Expected Response (XRES), where
In [14], the authors have analyzed the shortages of the HSSV = f 1Kuh (Ru, Rh) and XRES = f 2Kuh (Rh),
EPS AKA mechanism such as disclosure of user identity and then, it sends HSSV and XRES to MME.
MITM attack. The authors highlighted that the communication 5) MME generates a random value Rm, computes
between MME and HSS is not secured, as a result, the AV MME Verification value (MMEV), where M M EV
will be in risk. To overcome those issues, an enhanced = f 1Kum (HSSV, Rm) and sends the message
mechanism called Security Enhanced Authentication and (M M EV, Rm, Rh) to UE.
Key agreement (SE-EPS AKA) has been proposed based on 6) UE verifies HSSV and MMEV to authenticate HSS
Wireless Public Key Infrastructure (WPKI) and ECC (Ellipse server and MME, if matches it generates the RES
Curve Cipher) encryption method. The proposed mechanism value, where XRES = f 2Kuh (Rh) and sends it to
has been proofed using formal verification Model. To protect MME.
the user identity, the IMSI in SE-EPS-AKA protocol is 7) MME checks the received RES with the XRES, if
encrypted using the public key of HSS. In addition to public matches it sends a success message to UE, otherwise it
key, the possible IMSIs 1010 are known, which leads to a sends a failure message.
brute force attack.
Fig. 4. The proposed EEPS-AKA protocol 6) Key Hierarchy: In EEPS-AKA protocol, the key Kuh ,
that computed in UE and HSS can be used for future
vertical handover, where no need to compute it again
in both UE and the target HSS.
adversary then gets IMSI of UE. In our proposed
EESP-AKA protocol, we use a generated secret shared 7) Perfect Forward Secrecy: The EPS-AKA uses
key Kum by UE to protect the identity IMSI of MS. symmetric key K shared between the UE and the
The secret shared key is computed based on improved HSS to provide authentication and key agreement and
SPEKE, which is considered as one of the strongest generate CK, IK, and MSK. The attacker can disclose
authentication methods. The Kum key also computed K, therefore, EPS-AKA does not provide a perfect
by MME and sent to HSS to decrypt and verify the forward secrecy. In our proposed protocol the secret
received IMSI, it also used to compute the shared key key which is linked with the long term key K, is used
Kuh . Except MME and UE, nobody can generate the to generate the AKA keys and no one owns it, except
secret key Kum . If an adversary sends an identity UE and HSS, since it is computed separately rather
request to UE to get the IMSI, he/she will not be able than exchanged.
to know the IMSI, Even if he eavesdrops A and B
values.
3) Signaling Overhead: All steps of the proposed B. Formal Analysis using AVISPA
EEPS-AKA protocol are identical to the EPS-AKA. AVISPA is a simulation tool that can be used to model
No additional round-trip delays introduced compared and analyze security protocols. The mutual authentication and
to the original EPS-AKA. secrecy property can be examined using AVISPA. In this work,
the On-the-fly Model-Checker (OFMC) backend in AVISPA
4) MITM attack: Our proposed protocol is resistant to is used to validate the proposed EEPS-AKA. This is mainly
MITM attack. The user identity cannot be retrieved or due to its interesting features such as supporting various
altered by the attacker, since it is protected by a strong security protocols, checking whether the verified protocol is
secret key, only UE and HSS can do. Moreover, the able to provide strong authentication and secrecy, and the most
secret key is not transmitted or exchanged either in important feature is that OFMC tries to prove the lack of
clear or encrypted text. security in the protocol rather than proving its security. The
OFMC also provides details about the attack traces in case it
5) Brote force attack This type of attack obtains the occurs, otherwise its output shows that the protocol is safe. The
exchanged secret keys and checks all possible keys, specifications of EEPS-AKA method is written using HLPSL