全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

UMTSAKA机制中序列号安全性分析

DOI: 10.13190/j.jbupt.2015.增.020, PP. 87-91

Keywords: 认证与密钥协商,重放攻击,序列号,一次性随机数

Full-Text   Cite this paper   Add to My Lib

Abstract:

对认证与密钥协商协议(UMTSAKA)中无和有序列号SQN进行了3种攻击场景模拟并得到结论SQN的使用不能有效抵抗重放攻击.基于此,进一步分析并仿真了使用一次性随机数抵抗重放攻击的3种改进协议,结果表明AP-AKA和基于公钥密码学的AKA能够有效抵抗重放攻击,但是AP-AKA增加了实体的存储和计算资源,基于公钥密码学的AKA增加了算法的复杂性,而S-AKA只能部分抵抗重放攻击.

References

[1]  刘家芬, 周明天. 对安全协议重放攻击的分类研究[J]. 计算机应用研究, 2007, 3(24): 135-139. Liu Jiafen, Zhou Mingtian. Research and taxonomy of replay attacks on security protocol [J]. Application Research of Computers, 2007, 3(24): 135-139.
[2]  刘宪国, 薛红喜. 一种改进的高效鲁棒的3GPP AKA协议[J]. 通信技术, 2011, 2(44): 87-90. Liu Xianguo, Xue Hongxi. An improved highly-efficient and robust 3GPP AKA protocol [J]. Communications Technology, 2011, 2(44): 87-90.
[3]  Zhang M X, Fang Y G. Security analysis and enhancements of 3GPP authentication and key agreement protocol [J]. IEEE Trans on Wireless Communications, 2005, 4(2): 734-742.
[4]  陆峰, 郑康锋, 钮心忻, 等. 3GPP 认证与密钥协商协议安全性分析[J]. 软件学报, 2010, 7(21): 1768-1782. Lu Feng, Zheng Kangfeng, Niu Xinxin, et al. Security analysis of 3GPP authentication and key agreement protocol[J]. Journal of Software, 2010, 7(21): 1768-1782.
[5]  Huang Yulun, Shen Chih Ya, Shiuhpyng Winston Shieh. S-AKA: a provable and secure authentication key agreement protocol for UMTS networks[J]. IEEE Trans on Vehicular Technology, 2011, 9(60): 4509-4519.
[6]  3rd Generation Partnership Project. Technical specification group services and system aspects, 3G security, security architecture [S]. 2014.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133