The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for

3rdGeneration Partnership Project (3GPP) has proposed the Authentication and Key Agreement (AKA) protocol to achieve the security requirements of Evolved Packet System (EPS) in the Long Term Evolution (LTE) network, called (EPS- AKA) protocol. Nevertheless, the EPS-AKA protocol is still has some drawbacks in authentication process due to inherit some weaknesses from the predecessor protocols. This paper proposes a secure anonymity Key of Authentication and Key Agreement (SAK-AKA) protocol for LET network to enhance the security level of EPS-AKA protocol. The same security architecture of EPS-AKA is used by the proposed protocol without adding extra cost to the system. Specifically, the SAK-AKA protocol increases the difficulty of defeating the authentication messages by complete concealing of IMSI with perfect forward security. The extensive security analysis proves that the SAK-AKA protocol is secure against the drawbacks of current EPS- AKA protocol. Moreover, the performance analysis in terms of the bandwidth consumption, the authentication transmission overhead and the storage consumption demonstrates that the SAK-AKA protocol relatively is more efficient than the current EPS-AKA protocol.


[1] Ahmadi S., LTE-Advanced: A practical System to Understand 3GPP LET Released 10 and 11 Radio Access Technologies, Elsevier, 2014.

[2] Ajagaonkar K., Bhalerao A., Fakir Sh., Jagadale V., and Phadatare D., Advanced Subscriber Identity in 3GPP Mobile Systems, International Research Journal of Engineering and Technology, vol. 3, no. 5, pp. 2458-2463, 2016.

[3] Al-fayoumi M., Nashwan S., and Yousef S., A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks, in Proceeding of 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, New York, pp. 29, 2007.

[4] Arkko J., Norrman K., Naslund M., and Sahlin B., A USIM compatible 5G AKA protocol with perfect forward secrecy, in proceeding of 13th IEEE international Symposia on Parallel and Distributed Processing with Application, Helsinki, pp. 1205-1209, 2015.

[5] Aymen Z., QoS-based Performance and Resource Management in 3G Wireless Networks in Realistic Environments, The International Arab Journal of Information Technology, vol. 10, no. 1, pp. 1-9, 2013.

[6] Choudhary A. and Bhandari R., Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) Network , International Journal on Recent and innovation Trend in Computing Communication, vol. 3, no. 4, pp. 2146-2149, 2015.

[7] Copet P., Marchetto G., Sisto R., and Costa L., Formal verification of LTE-UMTS and LTE- LTE handover, Computer Standards and Interfaces, vol. 5, pp. 92-106, 2017.

[8] Degefa F., Lee D., Kim J., Choi Y., and Won D., Performance and Security Enhanced Authentication and Key Agreement Protocol for SAE/LTE Network, Computer Networks, vol. 94 pp. 145-163, 2016.

[9] Forsberg D., Horn G., Moeller W., and Niemi V., Lte Security, John Wiley and Sons, 2013.

[10] Kareem N., Implementation of Enhanced AKA in LTE Network, International Journal of Computer Science and Mobile Computing, vol. 4, no. 5, pp. 1124-1132, 2015.

[11] Lai Ch., Li H., Lu R., and Shen X., SE-AKA: A Secure and Efficient Group Authentication and Key Agreement Protocol for LTE Networks, Computer Networks, vol. 57, pp. 3482-3510, 2013.

[12] Liang W. and Wang W., A Quantitative Study of Authentication and QoS in Wireless IP Networks, in Proceeding of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, pp. 1478- 1489, 2005.

[13] Loriya H., Kulshreshta A., and Keraliya D., Security analysis of Authentication and Key Agreement Protocol for LTE Network, International Research Journal of Engineering, Science and Technology, vol. 3, no. 1, 2016.

[14] Nashwan S. and Alshammari B., Mutual Chain Authentication Protocol for SPAN Transactions in Saudi Arabian Banking, International Journal of Computer and Communication Engineering, vol. 3, no. 5. pp. 326-333, 2014.

[15] Purkhiabai M. and Salahi A., Enhanced Authentication and Key Agreement Procedure of Next Generation 3GPP Mobile Networks, International Journal of Information and Electronic Engineering, vol. 2, no. 1, pp. 69-77, 2012.

[16] Sarmah S., Kalita P., and Devi J., A New Approach to Authentication and Key Agreement in LTE 3GPP, International Journal of Computer Science Research and Technology, vol. 1, no. 4, 2013.

[17] Yang X., Huang X., and Liu J., Efficient Handover Authentication with User Anonymity and Untraceability for Mobile Cloud Computing, Future Generation Computer Systems, vol. 62, pp. 190-195, 2016.

[18] 3gpp-ts, 21.133 V4.1.0, 3rd Generation Partnership Project, Universal Mobile Telecommunications System (UMTS) , 3G security; Security threats and requirements (2001-12), Release 4.3GPP Organizational Partners.

[19] 3gpp-ts, 33-401, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, 3GPP System Architecture Evolution (SAE); Security architecture (2008- 10), Release 10. 3GPP Organizational Partners.

[20] 3gpp-ts, 35.216, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2; Document 2: SNOW 3G specification (2009-12), Release 9. 3GPP Organizational Partners. SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network 801 Shadi Nashwan received his B.Sc. degree in Computer Science from Alazhar University, Palestine, in 2001, and M.Sc. degree in Computer Science from university of Jordan, Jordan, in 2003, and Ph.D. degree in Computer Science from Anglia Ruskin University, UK, in 2009. He is head of Computer Science and Information department, Aljouf University, KSA. His research focuses on authentication protocol wireless network, mobility management, and wireless network security. He has published several papers in the area of authentication protocol, recovery techniques and mobility management.