[1]方颉翔,蒋睿,石清泉.LTE网间切换安全机制的形式化分析[J].东南大学学报(自然科学版),2011,41(1):6-10.[doi:10.3969/j.issn.1001-0505.2011.01.002]
 Fang Jiexiang,Jiang Rui,Shi Qingquan.Formal analysis of inter-RAT handover protocol in LTE[J].Journal of Southeast University (Natural Science Edition),2011,41(1):6-10.[doi:10.3969/j.issn.1001-0505.2011.01.002]
点击复制

LTE网间切换安全机制的形式化分析()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
41
期数:
2011年第1期
页码:
6-10
栏目:
仪器科学与技术
出版日期:
2011-01-20

文章信息/Info

Title:
Formal analysis of inter-RAT handover protocol in LTE
作者:
方颉翔蒋睿石清泉
(东南大学信息科学与工程学院,南京 210096)
Author(s):
Fang JiexiangJiang RuiShi Qingquan
(School of Information Science and Engineering, Southeast University, Nanjing 210096, China)
关键词:
LTE/SAE网间切换安全串空间模型认证测试
Keywords:
long term evolution (LTE)/system architecture evolution (SAE) inter-RAT(radio access technology) handover security strand space model authentication test
分类号:
TP393
DOI:
10.3969/j.issn.1001-0505.2011.01.002
摘要:
通过分析 3GPP LTE网间切换安全协议,发现通过监听网络消息的方式,入侵者可以在协议的信息交互过程中获取协议的2个核心密钥,并将其用于非法活动而不会被系统发现.为了解决这一问题,在保留原协议信息交互框架的基础上,提出了一种改进的3GPP LTE网间切换安全协议.该改进协议引入了公钥体系,保证密钥不会因为第三方的截取而泄露; 同时,改进的协议还为关键消息提供了消息传递双方的双向认证过程,不仅能保证消息传递双方身份,还能确保消息不会被第三方随意修改.最后,应用串空间模型理论及认证测试方法,从协议的机密性与认证的正确性2个方面形式化地检验了改进协议的安全性. 结果表明,改进的协议能够有效地保证消息的机密性与认证的正确性,从而确保协议的安全.
Abstract:
Through analyzing the inter-RAT(radio access technology) handover security protocol of the third generation partnership project(3GPP) long term evolution (LTE), a security flaw is pointed out. By monitoring network messages, intruders can get and use the keys without being found by network in the exchanging procedure. To solve this problem, an improved protocol which keeps the frame of the 3GPP’s protocol is given. In this protocol, the public key system is introduced to keep the core key from stealing. Meanwhile, the mutual authentication for important messages, which can not only ensure the identity of both sender and receiver but also avoid the message modification by other people, is provided. Finally, the security of the improved protocol is formally proved with the strand space model and authentication tests from the aspects of confidentiality and the correctness of authentication. The results indicate that the improved protocol can guarantee the confidentiality and freshness of messages, which guarantees the protocol’s security.

参考文献/References:

[1] 3GPP.3GPP system architecture evolution (SAE);security architecture V9.3.1 [EB/OL].(2010-04-14)[2010-05-03].http://www.3gpp.org/ftp/Specs/html-info/33401.htm.
[2] 3GPP.3GPP system architecture evolution (SAE);security aspects of non-3GPP accesses V9.3.0 [EB/OL].(2010-04-06)[2010-05-03].http://www.3gpp.org/ftp/Specs/html-info/33402.htm.
[3] 3GPP.Security aspects for inter-access mobility between non-3GPP and 3GPP access network V8.0.0 [EB/OL].(2008-12-11)[2010-05-03].http://www.3gpp.org/ftp/Specs/html-info/33822.htm.
[4] Kwak H,Lee P,Kim Y,et al.Management survey for home-eNB based 3GPP LTE systems [J].Journal of Information Processing Systems,2008,4(4):145-152.
[5] Pacifico D,Pacifico M,Fischione C,et al.Improving TCP performance during the intra-LTE handover[C]//Global Telecommunications Conference.Honolulu,HA,USA,2009:1-8.
[6] Su Dongming,Wen Xiangming,Zhang Haijun.A self-optimizing mobility management scheme based on cell ID information in high velocity environment[C]//Second International Computer and Network Technology Conference.Bangkok,Tailand,2010:285-288.
[7] Anand R P,Julien L,Alf Z,et al.Mobility and key management in SAE/LTE [C]//Wireless Communications 2007 CNIT Thyrrenian Symposium.Berlin,Germany:Springer,2008:165-178.
[8] Rajavelsamy R,Choi S.Security aspects of inter-access system mobility between 3GPP and non-3GPP networks[C]//3rd IEEE International Conference on Communication System Software and Middlewave.Bangalore,India,2007:209-213.
[9] Neila K,Noureddine B.Securing roaming and vertical handover in fourth generation networks[C]//Third International Network and System Security Conference. Gold Coast,Australia,2009:225-231.
[10] 3GPP.Rationale and track of security decisions in long term evolved (LTE) RAN/3GPP system architecture evolution V8.0.0[EB/OL].(2000-03-19)[2010-05-03].http://www.3gpp.org/ftp/Specs/html-info/33821.htm.
[11] Fabrega F,Herzog J,Guttman J.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230.
[12] Guttman J.Authentication tests and the structure of bundles[J].Theoretical Computer Science,2002,283(2):333-380.

备注/Memo

备注/Memo:
作者简介:方颉翔(1985—),男,硕士生;蒋睿(联系人),男,博士,副教授,r.jiang@seu.edu.cn.
基金项目:国家自然科学基金资助项目(60902008)、常州市高技术研究重点实验室研究课题资助项目(CM20103003).
引文格式: 方颉翔,蒋睿,石清泉.LTE网间切换安全机制的形式化分析[J].东南大学学报:自然科学版,2011,41(1):6-10.[doi:10.3969/j.issn.1001-0505.2011.01.002]
更新日期/Last Update: 2011-01-20