Previous Articles     Next Articles

Security Analysis and Improvement based on EAP-AKA Protocol

MIAO Jun-feng%MA Chun-guang%MENG Yan%ZHOU Yong-jin   

  • About author:哈尔滨工程大学计算机科学与技术学院,黑龙江哈尔滨,150001%哈尔滨工程大学计算机科学与技术学院,黑龙江哈尔滨 150001; 哈尔滨工程大学国家保密学院,黑龙江哈尔滨 150001

Abstract: In recent years, basing on 3G network and WLAN as the main representative of the wireless network technology which achieved a major breakthrough, 3G network can provide better roaming service in wide area, but the transmission data rate and network bandwidth is small, while the WLAN can provide higher data transmission speed and lower prices, but the network range is small, therefore, both 3G network and WLAN fusion can complement each other very well, which is to achieve a more efficient mode of high speed access. So the 3GPP puts forward a set of scheme for 3G based on WLAN neural network, and designs the Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA). But after a lot of practice and research findings, the EAP-AKA protocol has some security flaws and this paper analyzes the EAP-AKA protocol and security, and points out security flaws in protocol, which especially the user identity will be exposed leading to track attack caused by identity leakage and the lack of authentication of wireless local area network (WLAN) access network and plaintext transmission session key causes WLAN to lose communication process of confidentiality and integrity, which proposes a WLAN access network by adding a public key and an anonymous technology, completes on the WLAN access network authentication, and avoids exposure for the user identity information, and encrypts the session key to ensure to provide security for the user's network service.