Security performance analysis and enhancement of authentication and key agreement protocol for LTE networks

العناوين الأخرى

تحليل و تحسين الأداء الأمني لبروتوكول الجيل الرابع (LTE)‎

مقدم أطروحة جامعية

al-Shalalfah, Arij

مشرف أطروحة جامعية

al-Fayyumi, Mustafa

الجامعة

جامعة الأميرة سمية للتكنولوجيا

الكلية

كلية الملك الحسين لعلوم الحوسبة

القسم الأكاديمي

أمن نظم المعلومات و الجرائم الرقمية

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2018

الملخص الإنجليزي

Security is essential in most digital systems, including increasingly popular mobile networking.

Protecting user privacy requires secure authentication for service providers.

The authentication and key agreement (AKA) procedure for fourth-generation/ Evolved Packet System (4G/EPS) uses EPS-AKA protocol, part of network access security mechanisms that provide mutual authentication and key agreement between the communication parties (User/Network).

Although this procedure is staple in the security architecture of the EPS, it has weaknesses (such as exposing permanent user identity in clear-text and SQN synchronization failure) that can be exploited by intruders to mount severe attacks.

User identification is essential in AKA, but transmitting user identity in clear text through unsecured channels such as radio waves exposes the user privacy to breaches and other attacks such as denial of service (DoS).

This thesis proposes a security enhancement in the EPS authentication protocol to protect user ID privacy and mitigate the impact of DoS attack in an early stage.

The security of the proposed protocol was analyzed using the automatic analysis tool Scyther to test the security properties of the proposed protocol in terms of mutual authentication, user ID anonymity, user privacy, and data confidentiality.

The performance evaluation for the proposed protocol compared with the standard LTE protocol using mathematical analytics showed an improvement in the protocol performance in consideration of signaling load, bandwidth consumption, and authentication delay.

Minimizing the number of exchange message and the messages’ parameters sized in the protocol is reflected in the performance by reducing the signaling load to about .89%, the bandwidth consumption to 0.01%, and the delay time to 4/5 of the standard LTE protocol authentication delay.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

83

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background.

Chapter Three : Literature review.

Chapter Four : The enhancement of authentication protocol and key agreement (AKA) for LTE mobile networks.

Chapter Five : The Security analysis of the proposed protocol.

Chapter Six : Performance evaluation.

Chapter Seven : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Shalalfah, Arij. (2018). Security performance analysis and enhancement of authentication and key agreement protocol for LTE networks. (Master's theses Theses and Dissertations Master). Jordan
https://search.emarefa.net/detail/BIM-833362

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Shalalfah, Arij. Security performance analysis and enhancement of authentication and key agreement protocol for LTE networks. (Master's theses Theses and Dissertations Master). (2018).
https://search.emarefa.net/detail/BIM-833362

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Shalalfah, Arij. (2018). Security performance analysis and enhancement of authentication and key agreement protocol for LTE networks. (Master's theses Theses and Dissertations Master). Jordan
https://search.emarefa.net/detail/BIM-833362

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-833362