Round-Efficient Security Authentication Protocol for 5G Network

被引:0
|
作者
Geng, Guining [1 ]
Miao, Junfeng [2 ]
Xiao, Nan [2 ]
机构
[1] 360 Digital Secur Technol Grp Co Ltd, 2 Bldg,6 Yard,Jiuxianqiao Rd, Beijing 100015, Peoples R China
[2] Univ Sci & Technol Beijing, Beijing 100089, Peoples R China
关键词
5G; security; bilinear pairing; Schnorr Signature; protocol;
D O I
10.1007/978-3-031-41181-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security access problem of Fifth Generation Mobile communication (5G) system has become a research hotspot. The 3GPP defines 5G authentication and key agreement (5G AKA) protocol, which is used to protect the access security of mobile devices in 5G network. But it is found that there are still some security loopholes and some unrealistic system assumptions which play a decisive role in security, such as user tracking, pre-shared key K disclosure, security between service network and home network, which makes 5G vulnerable to various attacks. Therefore, we propose a security authentication protocol for 5G network based on Schnorr signature and bilinear algorithm to solve the above problems. Then the security of the protocol is proved by using Scyther. Finally, the theoretical analysis verifies the security of the protocol, and the security comparison and efficiency analysis further verify that the protocol has good resistance performance.
引用
收藏
页码:269 / 283
页数:15
相关论文
共 50 条
  • [1] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,
  • [2] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [3] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [4] Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 369 - 374
  • [5] Secure Authentication Protocol for 5G Enabled IoT Network
    Sharma, Suraj
    Satapathy, Shaswat
    Singh, Shivani
    Sahu, Amiya Kumar
    Obaidat, Mohammad S.
    Saxena, Sanjay
    Puthal, Deepak
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 621 - 626
  • [6] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [7] An Efficient Handover Authentication Mechanism for 5G Wireless Network
    Han, Kaihong
    Ma, Maode
    Li, Xiaohong
    Feng, Zhiyong
    Hao, Jianye
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [8] An Enhanced Cross-Network-Slice Authentication Protocol for 5G
    Yadav, Awaneesh Kumar
    Wijethilaka, Shalitha
    Braeken, An
    Misra, Manoj
    Liyanage, Madhusanka
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04): : 555 - 573
  • [9] Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
    Chan, Haowen
    Perrig, Adrian
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 257 - 272
  • [10] Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Miao J.
    Wang Z.
    Wang M.
    Feng X.
    Xiao N.
    Sun X.
    [J]. Wireless Communications and Mobile Computing, 2023, 2023