Issue No. 02 - March-April (2013 vol. 11)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.136
Anastasios N. Bikos , University of Patras
Nicolas Sklavos , Technological Educational Institute of Patras
The authors give an overview on the state of the art of potential security issues that occur in the deployment of the LTE/SAE (Long-Term Evolution/System Architecture Evolution) protocol in emerging 4G wireless technologies. Although security concerns and challenges in wireless networks will remain a hot topic in the future, the LTE/SAE standard could adapt to these rising challenges, becoming more robust and secure. By looking at the authentication and ciphering algorithms, such as EAP-AKA (Extensible Authentication Protocol for Authentication and Key Agreement), currently operating within the LTE protocol, the authors analyze several vulnerabilities in LTE/SAE security architecture—specifically, insecure AKA key derivation procedures and the lack of fast reauthentications during handovers.
Authentication, Protocols, Algorithm design and analysis, Encryption, Computer security, Mobile communication, Long Term Evolution, Computer architecture, Extensible Authentication Protocol for Authentication and Key Agreement, 4G wireless networks, LTE, LTE/SAE, standards, 3GPP, 3G, EAP-AKA, Long-Term Evolution/System Architecture Evolution, Long-Term Evolution
Anastasios N. Bikos, Nicolas Sklavos, "LTE/SAE Security Issues on 4G Wireless Networks", IEEE Security & Privacy, vol. 11, no. , pp. 55-62, March-April 2013, doi:10.1109/MSP.2012.136