CAVE-based authentication explained

CAVE-based authentication is an access authentication protocol based on used in CDMA2000 1X 3G mobile network systems, using the CAVE (Cellular Authentication and Voice Encryption) algorithm.[1] It is also known as HLR authentication, 2G Authentication, or Access Authentication.

Network entities

There are two network entities involved in CAVE-based authentication when roaming:

Keys

The authentication controller is the entity that determines whether the response from the MS is correct. Depending upon whether SSD is shared, the authentication controller may be either the AC or VLR. In either case, CAVE-based authentication is based on the CAVE algorithm and the following two shared keys:

Authentication challenges

CAVE-based authentication provides two types of challenges:

CAVE-based authentication is a one-way authentication mechanism that always involves the network authenticating the MS (with the exception of the base station challenge procedure that occurs only during an SSD update).

Specification

CAVE-based authentication procedures are specified in TIA-41 (3GPP2 X.S0004).

See also

External links

Notes and References

  1. Zhang . Chi . Liu . Jun-Rong . Gu . Da-Wu . Wang . Wei-Jia . Lu . Xiang-Jun . Guo . Zheng . Lu . Hai-Ning . Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks . Journal of Computer Science and Technology . 1 September 2019 . 34 . 5 . 1079–1095 . 10.1007/s11390-019-1961-5 . 18 June 2024 . en . 1860-4749.
  2. Book: Miceli . Andrew . Wireless technician's handbook . 2003 . Artech House . Boston, Mass. . 978-1580533577 . 2. . 18 June 2024.