Round-Efficient Security Authentication Protocol for 5G Network

被引:0
|
作者
Geng, Guining [1 ]
Miao, Junfeng [2 ]
Xiao, Nan [2 ]
机构
[1] 360 Digital Secur Technol Grp Co Ltd, 2 Bldg,6 Yard,Jiuxianqiao Rd, Beijing 100015, Peoples R China
[2] Univ Sci & Technol Beijing, Beijing 100089, Peoples R China
关键词
5G; security; bilinear pairing; Schnorr Signature; protocol;
D O I
10.1007/978-3-031-41181-6_15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security access problem of Fifth Generation Mobile communication (5G) system has become a research hotspot. The 3GPP defines 5G authentication and key agreement (5G AKA) protocol, which is used to protect the access security of mobile devices in 5G network. But it is found that there are still some security loopholes and some unrealistic system assumptions which play a decisive role in security, such as user tracking, pre-shared key K disclosure, security between service network and home network, which makes 5G vulnerable to various attacks. Therefore, we propose a security authentication protocol for 5G network based on Schnorr signature and bilinear algorithm to solve the above problems. Then the security of the protocol is proved by using Scyther. Finally, the theoretical analysis verifies the security of the protocol, and the security comparison and efficiency analysis further verify that the protocol has good resistance performance.
引用
收藏
页码:269 / 283
页数:15
相关论文
共 50 条
  • [41] Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks
    Sriraam, S., V
    Sajeev, Suraj
    Joshi, Rohit
    Vithalkar, Amogh
    Bansal, Manish
    Jagadeesh, Harshan
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [42] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    [J]. TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329
  • [43] Efficient handover protocol for 5G and beyond networks
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [44] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful J.
    Ali, Borhanuddin M.
    Jamalipour, Abbas
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [45] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [46] Security in 5G Network Slices: Concerns and Opportunities
    Singh, Virendra Pratap
    Singh, Mahendra Pratap
    Hegde, Saumya
    Gupta, Maanak
    [J]. IEEE ACCESS, 2024, 12 : 52727 - 52743
  • [47] 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
    You, Ilsun
    Kim, Gunwoo
    Shin, Seonghan
    Kwon, Hoseok
    Kim, Jongkil
    Baek, Joonsang
    [J]. SENSORS, 2024, 24 (01)
  • [48] 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks
    Xiao, Yuelei
    Wu, Yang
    [J]. INFORMATION, 2022, 13 (03)
  • [49] A formal security analysis of the fast authentication procedure based on the security context in 5G networks
    Zhiwei Cui
    Baojiang Cui
    Li Su
    Haitao Du
    Jie Xu
    Junsong Fu
    [J]. Soft Computing, 2024, 28 : 1865 - 1881
  • [50] A formal security analysis of the fast authentication procedure based on the security context in 5G networks
    Cui, Zhiwei
    Cui, Baojiang
    Su, Li
    Du, Haitao
    Xu, Jie
    Fu, Junsong
    [J]. SOFT COMPUTING, 2024, 28 (03) : 1865 - 1881