Round-Efficient Security Authentication Protocol for 5G Network

被引:0
|
作者
Geng, Guining [1 ]
Miao, Junfeng [2 ]
Xiao, Nan [2 ]
机构
[1] 360 Digital Secur Technol Grp Co Ltd, 2 Bldg,6 Yard,Jiuxianqiao Rd, Beijing 100015, Peoples R China
[2] Univ Sci & Technol Beijing, Beijing 100089, Peoples R China
关键词
5G; security; bilinear pairing; Schnorr Signature; protocol;
D O I
10.1007/978-3-031-41181-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security access problem of Fifth Generation Mobile communication (5G) system has become a research hotspot. The 3GPP defines 5G authentication and key agreement (5G AKA) protocol, which is used to protect the access security of mobile devices in 5G network. But it is found that there are still some security loopholes and some unrealistic system assumptions which play a decisive role in security, such as user tracking, pre-shared key K disclosure, security between service network and home network, which makes 5G vulnerable to various attacks. Therefore, we propose a security authentication protocol for 5G network based on Schnorr signature and bilinear algorithm to solve the above problems. Then the security of the protocol is proved by using Scyther. Finally, the theoretical analysis verifies the security of the protocol, and the security comparison and efficiency analysis further verify that the protocol has good resistance performance.
引用
收藏
页码:269 / 283
页数:15
相关论文
共 50 条
  • [31] Security and Protocol Exploit Analysis of the 5G Specifications
    Jover, Roger Piqueras
    Marojevic, Vuk
    [J]. IEEE ACCESS, 2019, 7 : 24956 - 24963
  • [32] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    [J]. Array, 2022, 16
  • [33] Physical Layer Security Assisted 5G Network Security
    Pan, Fei
    Jiang, Yixin
    Wen, Hong
    Liao, Runfa
    Xu, Aidong
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [35] Lega: A lightweight and efficient group authentication protocol for massive machine type communication in 5g networks
    Basudan, Sultan
    [J]. Journal of Communications and Information Networks, 2020, 5 (04) : 89 - 98
  • [36] Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian
    Huang, Chin-Tser
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [37] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [38] SKAP-NS: A Symmetric Key-Based Authentication Protocol for 5G Network Slicing
    Yadav, Awaneesh Kumar
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, : 13363 - 13372
  • [39] Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
    Miao, Junfeng
    Wang, Zhaoshun
    Ning, Xin
    Xiao, Nan
    Cai, Weiwei
    Liu, Ruimin
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 1852 - 1869
  • [40] A new authentication and key agreement protocol for 5G wireless networks
    Tian Liu
    Fan Wu
    Xiong Li
    Chaoyang Chen
    [J]. Telecommunication Systems, 2021, 78 : 317 - 329