The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

被引:3
|
作者
Fei, Teng [1 ]
Wang, Wenye [1 ]
机构
[1] NC State Univ, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Long-term evolution (LTE); Authentication protocol; Analysis and verification;
D O I
10.1016/j.comnet.2023.109685
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Long-Term Evolution (LTE)/5G network connects much of the world's population to provide subscriber's voice calls and mobile data delivery, with security provided by the Authentication and Key Agreement (AKA) defined by 3GPP, which makes the LTE/5G network more secure than all its predecessors. Primarily due to the access limitations of LTE systems, the vulnerabilities of AKA protocol and potential attacks have not received much investigation, which is essential to LTE users with a tremendous amount of cellular services. In this study, we focus on two questions: (i) what are the vulnerabilities that can be exploited to carry out attacks in practice? and (ii) how to design an enhanced AKA protocol against such attacks? We examine the detailed procedures of Evolved Packet System (EPS)-AKA protocol by 3GPP, and have identified three types of attacks with respect to catching, location tracking, and jamming. We have designed and implemented attacks with commercial equipment to evaluate their threats in practice. In addition, we propose an enhanced AKA protocol that essentially relies on asymmetric encryption rather than symmetric in the AKA protocol and additional digital signatures to countermeasure these attacks. Finally, we verified our solution through formal verification to prove that our solution can mitigate the newly found vulnerabilities.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [2] TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks
    Liu, Yibing
    Huo, Lijun
    Zhou, Gang
    IET INFORMATION SECURITY, 2022, 16 (03) : 193 - 207
  • [3] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [4] Device-to-device group authentication compatible with 5G AKA protocol
    Braeken, An
    COMPUTER NETWORKS, 2021, 201
  • [5] 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
    You, Ilsun
    Kim, Gunwoo
    Shin, Seonghan
    Kwon, Hoseok
    Kim, Jongkil
    Baek, Joonsang
    SENSORS, 2024, 24 (01)
  • [6] The 5G-AKA Authentication Protocol Privacy
    Koutsos, Adrien
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 464 - 479
  • [7] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [8] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [9] Reducing the Overhead Messages Cost of the SAK-AKA Authentication Scheme for 4G/5G Mobile Networks
    Nashwan, Shadi
    Nashwan, Imad I. H.
    IEEE ACCESS, 2021, 9 : 97539 - 97545
  • [10] REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks
    Mobarhan, Mostafa Ayoubi
    Salamah, Mohammed
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 201