{"title":"Secure handoff protocol in 3GPP LTE networks","authors":"Imen Elbouabidi, Ikbel Daly, F. Zarai","doi":"10.1109/ComNet.2012.6217746","DOIUrl":null,"url":null,"abstract":"To provide secure 3GPP LTE-WLAN interworking, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the-middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, in this paper, we propose new re-authentication protocol for wireless 3GPP LTE. The proposed protocol guarantees stronger security, mutual authentication, and resistance against many attacks. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.","PeriodicalId":296060,"journal":{"name":"Third International Conference on Communications and Networking","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Communications and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComNet.2012.6217746","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
To provide secure 3GPP LTE-WLAN interworking, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the-middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, in this paper, we propose new re-authentication protocol for wireless 3GPP LTE. The proposed protocol guarantees stronger security, mutual authentication, and resistance against many attacks. The suggested solution proves its effectiveness following the studies of simulation which carried out according to different criteria handoff latency, loss and blocking rate.