Академический Документы
Профессиональный Документы
Культура Документы
1, January 2012
I. INTRODUCTION
LTE project aims to ensure the continued competitiveness
of 3GPP technologies for the future. Its objective is to
develop a framework for an evolution or migration of 3GPP
system to higher data- rate, lower-latency, packet-optimized
system, multiple Radio Access Technologies (RATs). In
addition to LTE, 3GPP has specified flat IP-based network
architecture as part of the system architecture evolution (SAE)
effort [1]. EPS represents the very latest evolution of the
UMTS standard and LTE, which dedicated to the evolution
of the radio interface, and SAE which focuses on core
network architecture evolution. The SAE/LTE architecture
aims at integrating multiple wireless network technologies to
deliver secure services to users. The rapid growth of mobile
networks enables convenient access to integrated services
Manuscript received August 20, 2011; revised October 27, 2011.
Masoumeh Purkhiabani is with Department of Electrical Engineering
Islamic Azad University South Tehran Branch,Tehran,Iran
Ahmad Salahi is from Iran Telecommunication Research Center, Tehran,
Iran
69
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
Fig.2. MME fetching the EPS Authentication Vector from Hss/AuC [10]
71
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
UE
Msg
msg0
msg1={GUTI(IMSI)
TAI}
msg1
SN-MME
Msg
msg3
msg4
HE-HSS/AuC
XAK=f5k(RAND)
SQN=XAK SQNAK
XMAC=f1k(SQNRAND
AMF)=?MAC
msg5
XSQN=?SQN
Compared RES XRES
msg5=RES=f2k(RAND)
RES=?XRES
CK=f3k(RAND)
Retrieve KASME from AV[i]
IK=f4k(RAND)
KASME can sent from HSS to SN after
KASME=KDF(SQNAK,SN
conforming mutual authentication
id , CK,IK)
Fig. 4. EPS-AKA procedure
RES [i,j]=f2SNR[i](RAND[i,j]),
CK [i,j]=f3SNR[i](RAND[i,j]),
IK [i,j]=f4SNR[i](RAND[i,j]),
KASME[i,j]=KDF(SNR[i],SN id , CK[i,j],IK[i,j]),
SNAV[i,j]=(RAND[i,j]RES[i,j] KASME[i,j]), ( i and j , in
order is 0m and 0n ),
msg2= {msg1SN identitytypeSNR[i]} is sent to HSS.
msg3: In HSS after verification msg2 and retrieving
random key (SN[i]) andrandom number (MSR), parameters
for one vector is calculated as follows:
72
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
MSMAC=f1k(MSR)
msg1={GUTI(IMSI)
TAIMSR
MSMAC }
MSCK=f3k(MSR)
MSIK=f4k(MSR)
MSRES=f2k(MSR)
MSAK=f5k(MSR)
ms
g
ms
g0
ms
g1
P1=1/n
SN-MME
msg
P2= (n-1)/n
HE-HSS/AuC
73
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
MS
msg
SN-MME
msg
HE-HSS/AuC
msg4
msg4=RAND[i,j] AUTNKSIASME
RES=RES[i,j] HERES[i]=?XRES
KASME[i,j] , related to SNR[i], by
IK[i,j] is driven.
CK[i,j]
= (n-1)/n (192+291+64)
+ 1/n (192+448+608n+291+64))
(average number of authentication events per MME)
(Proposed-AKA, MME):
((k-1)/k number of bits+ 1/k number of bits)(average
number of authentication events per MME)
= ((k-1)/k (L (msg1)
+L (msg4) +L (msg5))
+ 1/k (L (msg1) +L (msg2) +L (msg3) +L (msg4) + L
(msg5)))(average number of authentication events per
MME)
= ((k-1)/k (L ({GUTI (IMSI (TAIMSR MSMAC})
+L (RAND [i,j] AUTNKSIASME)+L(XRES))
+ 1/k (L({GUTI (IMSI (TAIMSR MSMAC })
+L ({msg1SN identitytypeSNR[i]})
+L (HEAV[i]) +L (RAND [i,j] AUTNKSIASME)
+ L (XRES)))(average number of authentication events per
MME)
= ((k-1)/k (320+371+64)
+ 1/k (320+640+560+371+64))(average number of
authentication events per MME)
(EPS-AKA, HSS):
1/n2 (L (msg2)
+L (msg3))(average number of authentication events
per HSS)
74
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
75
quantities
1050
150
50
300/km2
300/km2
1635000
3.2/hr/user
3.2/hr/user
6 km
18 km
36 km
2.6 km2
18.2km2
54.5 km2
4.3 km/hr
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
(a)
(b)
Fig. 8.Bandwidth consumption by HSS in both EPS-AKA and proposed
AKA (a and b)
International Journal of Information and Electronics Engineering, Vol. 2, No. 1, January 2012
[7]
[8]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[9]
[10]
[11]
[12]
[13]
[14]
77