Skip to main content

Enhancing Security of LTE using a Double Masking Technique

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

LTE uses the Evolved Packet System Authentication and Key Agreement (EPS-AKA) procedure to establish and verify keys. However, the EPS-AKA is vulnerable to attacks such as disclosure of the user identity, man-in-the-middle attack and denial of services; therefore, a robust authentication mechanism is required. In this paper, we enhance security of LTE by using a double masking technique, in which both the identity key of the user equipment (UE), i.e., IMSI, and the random challenge key, i.e., RAND, are masked without being exposed in the authentication process. The proposed double masking technique is effective in performing mutual authentication of the user and the network. Security analysis shows that this technique is more secure than the original EPS-AKA since IMSI and RAND are well-protected and achieve practical security. Since all operators used in encrypting keys are simple and efficient, it works without degrading the performance of the existing LTE system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Purkhiabani and A. Salahi, “Enhanced Authentication and Key Agreement Procedure of next Generation 3GPP Mobile Networks,” International Journal of Information and Electronics Engineering, vol. 2, no. 1, January 2012, pp. 69-77.

    Google Scholar 

  2. N. Seddigh, B. Nandy, R. Makkar, and J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” Annual International Conference on Privacy, Security and Trust, 2010, pp. 62-71.

    Google Scholar 

  3. B. Rashidi and C. Fung, “A Survey of Android Security Threats and Defenses,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 3, September 2015, pp. 3-35.

    Google Scholar 

  4. M. Aiash, G.E. Mapp, A. Lasebae and R. Phan, “Providing Security in 4G Systems: Unveiling the Challenges,” Advanced International Conference on Telecommunications, 2010, pp. 439-444.

    Google Scholar 

  5. A. Skovoroda and D. Gamayunov, “Securing mobile devices: malware mitigation methods,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 2, June 2015, pp. 78-97.

    Google Scholar 

  6. M.A. Abdrabou, A.D.E. Elbayoumy, E.A. El-Wanis, “LTE Authentication Protocol (EPS-AKA) Weaknesses Solution,” IEEE International Conference on Intelligent Computing and Information Systems, 2015, pp. 434-441.

    Google Scholar 

  7. A.A. Mazroa, M. Arozullah, “Detection and Remediation of Attack by Fake Base Stations in LTE Networks,” International Journal of Soft Computing and Engineering vol. 5, issue-2, May 2015, pp. 12-15.

    Google Scholar 

  8. C.G. Apostol and C. Răcuciu, “Improving LTE EPS-AKA using the Security Request Vector,” 7th Edition Electronics, Computers and Artificial Intelligence, June 2015, pp. 185-188.

    Google Scholar 

  9. T. kurokawa, R. Nojima, and S. Moriai, “On the security of CBC Mode in SSL3.0 and TLS1.0,” Journal of Internet Services and Information Security, vol. 6, issue 1, February 2016, pp. 2-19.

    Google Scholar 

  10. Y.L. Huang, C.R. Dai, and F.Y. Leu, and I. You, “A Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,” International Journal of Web and Grid Services, vol. 11, no. 1, January, 2015, pp. 102-124.

    Google Scholar 

  11. Y.L. Huang, F.Y. Leu and K.C. Wei, “A Secure Communication over Wireless Environments by using a Data Connection Core,” Mathematical and Computer Modelling, vol. 58, no. 5-6, September 2013, pp. 1459-1474.

    Google Scholar 

  12. A. Kitana, I. Traore, and I. Woungang, “Impact Study of a Mobile Botnet over LTE Networks,” Journal of Internet Services and Information Security, vol. 6, issue 2, May 2016, pp. 1-22.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-Chun Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Liu, JC., Huang, YL., Leu, FY. (2017). Enhancing Security of LTE using a Double Masking Technique. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_75

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics