Khodor Hamandi, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi
{"title":"W-AKA:在Wi-Fi上使用安全通道的隐私增强LTE-AKA","authors":"Khodor Hamandi, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/WTS.2013.6566240","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a privacy-enhanced LTE authentication and key agreement scheme, W-AKA. The scheme promises to improve privacy by employing a dynamic identity instead of the static IMSI. In order to exchange the IMSI and inform the user of the new randomized identity, we propose two methods. The first method uses a Wi-Fi secured side channel since Wi-Fi hotspots are becoming ubiquitous. The other method is incorporated as part of the mobile AKA. We also present a simple method through which a random temporary identity is generated. We studied the conditions where W-AKA outperforms the original AKA and where it underperforms. Our analysis shows that in the presence of Wi-Fi, and unless an attacker jams the Wi-Fi channel, W-AKA can sustain both active and passive attacks. On the other hand, in the absence of Wi-Fi, it can only mitigate risks of passive attacks. The difficulties and challenges of the proposed work are also analyzed. The scheme was implemented and compared with previously-published techniques in order to study the computational overhead to accomplish enhanced privacy.","PeriodicalId":441229,"journal":{"name":"2013 Wireless Telecommunications Symposium (WTS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi\",\"authors\":\"Khodor Hamandi, Imad Sarji, I. Elhajj, A. Chehab, A. Kayssi\",\"doi\":\"10.1109/WTS.2013.6566240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a privacy-enhanced LTE authentication and key agreement scheme, W-AKA. The scheme promises to improve privacy by employing a dynamic identity instead of the static IMSI. In order to exchange the IMSI and inform the user of the new randomized identity, we propose two methods. The first method uses a Wi-Fi secured side channel since Wi-Fi hotspots are becoming ubiquitous. The other method is incorporated as part of the mobile AKA. We also present a simple method through which a random temporary identity is generated. We studied the conditions where W-AKA outperforms the original AKA and where it underperforms. Our analysis shows that in the presence of Wi-Fi, and unless an attacker jams the Wi-Fi channel, W-AKA can sustain both active and passive attacks. On the other hand, in the absence of Wi-Fi, it can only mitigate risks of passive attacks. The difficulties and challenges of the proposed work are also analyzed. The scheme was implemented and compared with previously-published techniques in order to study the computational overhead to accomplish enhanced privacy.\",\"PeriodicalId\":441229,\"journal\":{\"name\":\"2013 Wireless Telecommunications Symposium (WTS)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Wireless Telecommunications Symposium (WTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WTS.2013.6566240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Wireless Telecommunications Symposium (WTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WTS.2013.6566240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
W-AKA: Privacy-enhanced LTE-AKA using secured channel over Wi-Fi
In this paper, we propose a privacy-enhanced LTE authentication and key agreement scheme, W-AKA. The scheme promises to improve privacy by employing a dynamic identity instead of the static IMSI. In order to exchange the IMSI and inform the user of the new randomized identity, we propose two methods. The first method uses a Wi-Fi secured side channel since Wi-Fi hotspots are becoming ubiquitous. The other method is incorporated as part of the mobile AKA. We also present a simple method through which a random temporary identity is generated. We studied the conditions where W-AKA outperforms the original AKA and where it underperforms. Our analysis shows that in the presence of Wi-Fi, and unless an attacker jams the Wi-Fi channel, W-AKA can sustain both active and passive attacks. On the other hand, in the absence of Wi-Fi, it can only mitigate risks of passive attacks. The difficulties and challenges of the proposed work are also analyzed. The scheme was implemented and compared with previously-published techniques in order to study the computational overhead to accomplish enhanced privacy.