Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

被引:0
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J. [2 ]
机构
[1] School of Science and Technology, Middlesex University, The Burroughs, Hendon, London
[2] School of Computing and Engineering, University of West London, St Mary's Rd, Ealing, London
来源
Array | 2022年 / 16卷
关键词
5G; Applied pi calculus; Authentication; EAP-AKA; Formal methods; Performance evaluation; ProVerif; Security protocol; Verification;
D O I
10.1016/j.array.2022.100254
中图分类号
学科分类号
摘要
The end user's Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP-AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol's performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results. © 2022 The Author(s)
引用
收藏
相关论文
共 50 条
  • [1] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    [J]. 2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [2] Security Analysis of 5G Network EAP-AKA' Protocol Based on Lowe's Taxonomy
    Liu Caixia
    Hu Xinxin
    Liu Shuxin
    You Wei
    Zhao Yu
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (08) : 1800 - 1807
  • [3] Improved EAP-AKA Protocol Based on Redirection Defense
    Yu, Binbin
    Zhang, Jianwu
    Wu, Zhendong
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 543 - 547
  • [4] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [5] Design and Implementation of Active Access Control System by Using NFC-based EAP-AKA Protocol
    Seung-Su Yang
    Young-Hwan Jang
    Min-Hyung Park
    Seok-Cheon Park
    Hyung-Joon Kim
    [J]. Wireless Personal Communications, 2021, 118 : 2487 - 2503
  • [6] 基于Lowe分类法的5G网络EAP-AKA'协议安全性分析
    刘彩霞
    胡鑫鑫
    刘树新
    游伟
    赵宇
    [J]. 电子与信息学报, 2019, (08) : 1800 - 1807
  • [7] Design and Implementation of Active Access Control System by Using NFC-based EAP-AKA Protocol
    Yang, Seung-Su
    Jang, Young-Hwan
    Park, Min-Hyung
    Park, Seok-Cheon
    Kim, Hyung-Joon
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 2487 - 2503
  • [8] Use of EAP-AKA, IETF hokey and AAA mechanisms to provide access and handover security and 3G-802.16m interworking
    Nakhjiri, Madjid
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 4059 - 4063
  • [9] Secure 3GPP-WLAN Authentication Protocol Based on EAP-AKA
    Patkar, Shruti S.
    Ambawade, Dayanand D.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1011 - 1016
  • [10] AN OPTIMAL INTERWORKING AUTHENTICATION SCHEME BASED ON EAP-AKA FOR HETEROGENEOUS ACCESS NETWORKS
    Song, Mei
    Wang, Li
    Huang, Jianwen
    Song, Junde
    [J]. 2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 1003 - +