Visible to the public Anonymous Authentication and Key Agreement Protocol for LTE Networks

TitleAnonymous Authentication and Key Agreement Protocol for LTE Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsFan, Chun-I, Tseng, Yi-Fan, Cheng, Chen-Hsi, Kuo, Hsin-Nan, Huang, Jheng-Jia, Shih, Yu-Tse
Conference Name2019 2nd International Conference on Communication Engineering and Technology (ICCET)
Keywords3G mobile communication, 3GPP, anonymous, anonymous authentication, anonymous messaging, authenticated scheme suitable, authentication, authentication and key agreement protocol, authentication processes, communication standard, cryptographic protocols, fake stations, high-speed wireless communication standard, International Mobile Subscriber Identity, Internet, key agreement protocol, Long Term Evolution, LTE networks, message authentication, mobile terminal, Protocols, pseudo IMSI, pseudorandom permutation, pubcrawl, resilience, Resiliency, Scalability, signature, specific base station, standard TS
AbstractIn 2008, 3GPP proposed the Long Term Evolution (LTE) in version 8. The standard is used in high-speed wireless communication standard for mobile terminal in telecommunication. It supports subscribers to access internet via specific base station after authentication. These authentication processes were defined in standard TS33.401 and TS33.102 by 3GPP. Authenticated processing standard inherits the authentication and key agreement protocol in RFC3310 and has been changed into authenticated scheme suitable for LTE. In the origin LTE authenticated scheme, subscribers need to transfer its International Mobile Subscriber Identity (IMSI) with plaintext. The IMSI might be intercepted and traced by fake stations. In this work, we propose a new scheme with a pseudo IMSI so that fake stations cannot get the real IMSI and trace the subscriber. The subscriber can keep anonymous and be confirmed by the base station for the legality. The pseudo identity is unlinkable to the subscriber. Not only does the proposed scheme enhance the security but also it just has some extra costs for signature generation and verification as compared to the original scheme.
DOI10.1109/ICCET.2019.8726911
Citation Keyfan_anonymous_2019