Confidential initial identification and other improvements for UMTS security
Article first published online: 20 MAR 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 3, pages 558–566, March 2014
How to Cite
Caragata, D., El Assad, S., Shoniregun, C. and Akmayeva, G. (2014), Confidential initial identification and other improvements for UMTS security. Security Comm. Networks, 7: 558–566. doi: 10.1002/sec.757
- Issue published online: 19 FEB 2014
- Article first published online: 20 MAR 2013
- Manuscript Accepted: 24 JAN 2013
- Manuscript Received: 18 DEC 2012
- UMTS security;
- security protocols;
- initial identification;
- authentication and key agreement
One of the most important Universal Mobile Telecommunications System security breaches that were identified was the identity catching vulnerability. Whenever the user turns his mobile device on or if the service network fails, the International Mobile Subscriber Identity will be sent in clear over the radio link. This allows the International Mobile Subscriber Identity to be intercepted by an attacker who can use it for different purposes. In this paper, we present a Confidential Initial Identification Protocol that protects user identity and also offers the support for further Universal Mobile Telecommunications System security improvement, especially in the authentication and key agreement protocol and the security algorithms negotiation protocol. We show that these new protocols solve the identity catching vulnerability, limit the secret key exposure to cryptographic attacks, and increase the level of confidence of the user and the home network put in the service network. Copyright © 2013 John Wiley & Sons, Ltd.