تقييم أداء بروتوكولات المصادقة في الشبكات الخلوية وفقاً لجودة الخدمة
Abstract
نجحت شبكات LTE (Long Term Evolution) باعتبارها ذات انتاجية عالية أن تكون المظلة للشبكات اللاسلكية, مما دفع الباحثين بشدة الى دراسة وحل الثغرات الأمنية الموجودة. وكانت المصادقة المتبادلة التي اعتمدتها شبكات المحمول للتغلب على نقاط الضعف التي تُستغل لاصطياد المعِّرف الخاص بالمشترك IMSI (International Mobile Subscriber Identity) , نجح تنفيذ المصادقة المتبادلة في نظام الحزم المطّور EPS AKA (Evolved Packet System) بتعزيز الأمن على الشبكة، لكنها فشلت في تغطية نقاط الضعف التي ورثت من UMTS .إحدى هذه النقاط هو اصطياد IMSI خلال اجراء تحديد هوية المشترك .على الشبكة. حاول العديد من الباحثين على مدى السنوات الماضية، اقتراح بدائل عن EPS-AKA قادرة على ضمان مستويات عالية من الأمن وتقديم أداء جودة خدمة مقبول. في هذا البحث، سوف نقوم بتحليل SPAKA وPBKP الذي حل نقاط الضعف في EPS-AKA ، ثم سنقارن أداء جودة الخدمة لـEC-AKA وEPS AKA . البروتوكول المقترح "EC-AKA" هو المرشح الحقيقي ليحل محل المصادقة الحالية وبروتوكول اتفاق المفاتيح، لأدائه الممتاز في جميع البارامترات التي تمت دراستها. LTE’s success as a high throughput, and umbrella technology for wireless networks is highly affected by the researchers’ capability of solving its current security vulnerabilities. Mutual authentication was adopted by mobile networks to overcome vulnerabilities exploited by “IMSI catcher” and other active attacks. 3GPP’s mutual authentication implementation in EPS AKA succeeded in enhancing the network’s security, but failed to cover weaknesses inherited from its predecessor (UMTS). One of those vulnerabilities is the passive capturing of IMSIs during user identification in the Authentication and Key Agreement protocol. Many researchers tried over the past years, to propose an alternative for EPS AKA, able to ensure high levels of security and offer acceptable QoS performance. In this paper, we will crypt-analyze (SPAKA and PBKP) which was claimed to solve EPS AKA’s privacy and mutual authentication weaknesses, then we will compare its QoS performance to EC-AKA and EPS AKA. Our proposed protocol “EC-AKA” is a real candidate to replace the current authentication and Key Agreement protocol, because of its excellent performance in all the studied parameters.Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 ttps://creativecommons.org/licenses/by-nc-sa/4.0/
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The authors retain the copyright and grant the right to publish in the magazine for the first time with the transfer of the commercial right to Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series
Under a CC BY- NC-SA 04 license that allows others to share the work with of the work's authorship and initial publication in this journal. Authors can use a copy of their articles in their scientific activity, and on their scientific websites, provided that the place of publication is indicted in Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series . The Readers have the right to send, print and subscribe to the initial version of the article, and the title of Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series Publisher
journal uses a CC BY-NC-SA license which mean
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.