Abstract

Aiming at to avoid the security drawbacks of the authentication protocol in Long Term Evolution-Wireless Local Area Network (LTE-WLAN) heterogeneous converged network proposed by the 3rd Generation Partnership Project (3GPP), an improved protocol based on hybrid cryptosystem is proposed to achieve access authentication for WLAN user equipment(UE) with identity privacy protection. The security analysis shows that by using certificateless signcryption(CLSC) scheme without pairing calculation based on Elliptic Curve Cryptography (ECC), hash chain and identity index mechanism, the proposed authentication protocol provides the following ten kinds of security properties: anonymous protection for International Mobile Subscriber Identity (IMSI), update on shared keys, protection for master session key(MSK), resistance to impersonation attack, replay attack, man-in-the-middle attack, redirect attack and Denial of Service (DoS) attack, mutual authentication between communication entities, and without framework modification from the original protocol. The performance analysis shows that the approximate calculation time of all the communication entities is 79 ms in total and that of UE is 266 us . Thus, our proposed protocol is superior to some other related improved protocols in terms of security and efficiency.

Highlights

  • Heterogeneous converged network has become the development trend of future communication system, providing users with diversified services

  • EAP-AKA/EAP-AKA’ (Extensible Authentication Protocol-Authentication and Key Agreement/ Improved Extensible Authentication Protocol-Authentication and Key Agreement) is the authentication protocol in LTE-WLAN heterogeneous converged network proposed by 3rd Generation Partnership Project (3GPP), which adopts symmetric cryptography to realize the authentication of users, meeting most security requirements

  • OF THE SCHEME PROPOSED BY FU Fu [4] proposed an authentication protocol for WLAN access in LTE-WLAN network based on proxy signature mechanism and elliptic curve cryptography(ECC)

Read more

Summary

INTRODUCTION

In the protocol proposed by Bassoli R et al., IMSI is encrypted by the same public key from AAA to achieve identity anonymity protection in every round of authentication process without dynamic identity updating mechanism, which provides the traceability of the user. F. INTRODUCTION AND ANALYSIS OF THE SCHEME PROPOSED BY EL IDRISSI Y E H et al. El Idrissi et al [15] proposed an improved scheme based on Elliptic curve cryptography, in which the shared session key between UE and HSS was generated by key exchange algorithm ECDH(Elliptic Curve Diffie-Hellman) and updated in every round of authentication process. The improved scheme provides forward security and mutual authentication between communication entities, the assumptions in the scheme are not in line with the actual application In their scheme, AAA and HSS have established secure connection without any authentication process, so do AAA and WLAN AN. IMPROVED SCHEME IEAP-AKA a security enhanced authentication scheme in LTE-WLAN heterogeneous converged network based on certificateless signcryption scheme with identity privacy protection is proposed to achieve high security without drawbacks in original EAP-AKA protocol

INTRODUCTION OF CLSC SCHEME
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call