The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

被引:3
|
作者
Fei, Teng [1 ]
Wang, Wenye [1 ]
机构
[1] NC State Univ, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Long-term evolution (LTE); Authentication protocol; Analysis and verification;
D O I
10.1016/j.comnet.2023.109685
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Long-Term Evolution (LTE)/5G network connects much of the world's population to provide subscriber's voice calls and mobile data delivery, with security provided by the Authentication and Key Agreement (AKA) defined by 3GPP, which makes the LTE/5G network more secure than all its predecessors. Primarily due to the access limitations of LTE systems, the vulnerabilities of AKA protocol and potential attacks have not received much investigation, which is essential to LTE users with a tremendous amount of cellular services. In this study, we focus on two questions: (i) what are the vulnerabilities that can be exploited to carry out attacks in practice? and (ii) how to design an enhanced AKA protocol against such attacks? We examine the detailed procedures of Evolved Packet System (EPS)-AKA protocol by 3GPP, and have identified three types of attacks with respect to catching, location tracking, and jamming. We have designed and implemented attacks with commercial equipment to evaluate their threats in practice. In addition, we propose an enhanced AKA protocol that essentially relies on asymmetric encryption rather than symmetric in the AKA protocol and additional digital signatures to countermeasure these attacks. Finally, we verified our solution through formal verification to prove that our solution can mitigate the newly found vulnerabilities.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Energy Efficiency Enhancement in 5G Mobile Wireless Networks
    Zhao, Qi
    Gerla, Mario
    2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [22] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [23] Advanced 5G-TCP: Transport protocol for 5G Mobile Networks
    Petrov, Ivan
    Janevski, Toni
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 103 - 107
  • [24] SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
    Lai, Chengzhe
    Li, Hui
    Lu, Rongxing
    Shen, Xuemin
    COMPUTER NETWORKS, 2013, 57 (17) : 3492 - 3510
  • [25] A Vulnerability in 5G Authentication Protocols and Its Countermeasure
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Li, Jinsong
    Cheng, Xiaotao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (08) : 1806 - 1809
  • [26] 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks
    Xiao, Yuelei
    Wu, Yang
    INFORMATION, 2022, 13 (03)
  • [27] A secure and efficient handover authentication and key management protocol for 5G networks
    Huang, Jia Qi
    Qian, Yi
    Journal of Communications and Information Networks, 2020, 5 (01) : 40 - 49
  • [28] Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Miao J.
    Wang Z.
    Wang M.
    Feng X.
    Xiao N.
    Sun X.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [29] A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
    Miao, Junfeng
    Wang, Zhaoshun
    Miao, Xue
    Xing, Longyue
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [30] Token-Based Authentication Framework for 5G MEC Mobile Networks
    Niewolski, Wojciech
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    ELECTRONICS, 2021, 10 (14)