The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

被引:3
|
作者
Fei, Teng [1 ]
Wang, Wenye [1 ]
机构
[1] NC State Univ, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Long-term evolution (LTE); Authentication protocol; Analysis and verification;
D O I
10.1016/j.comnet.2023.109685
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Long-Term Evolution (LTE)/5G network connects much of the world's population to provide subscriber's voice calls and mobile data delivery, with security provided by the Authentication and Key Agreement (AKA) defined by 3GPP, which makes the LTE/5G network more secure than all its predecessors. Primarily due to the access limitations of LTE systems, the vulnerabilities of AKA protocol and potential attacks have not received much investigation, which is essential to LTE users with a tremendous amount of cellular services. In this study, we focus on two questions: (i) what are the vulnerabilities that can be exploited to carry out attacks in practice? and (ii) how to design an enhanced AKA protocol against such attacks? We examine the detailed procedures of Evolved Packet System (EPS)-AKA protocol by 3GPP, and have identified three types of attacks with respect to catching, location tracking, and jamming. We have designed and implemented attacks with commercial equipment to evaluate their threats in practice. In addition, we propose an enhanced AKA protocol that essentially relies on asymmetric encryption rather than symmetric in the AKA protocol and additional digital signatures to countermeasure these attacks. Finally, we verified our solution through formal verification to prove that our solution can mitigate the newly found vulnerabilities.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks
    Lanoue, Matthew J.
    Michael, James Bret
    Bollmann, Chad A.
    2021 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2021,
  • [32] A Generic Construction for Efficient and Secure AKA Protocol in 5G Network
    Gupta, Shubham
    Parne, Balu
    Chaudhari, Narendra S.
    2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [33] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209
  • [34] A survey on authentication and access control for mobile networks: from 4G to 5G
    Shanay Behrad
    Emmanuel Bertin
    Noel Crespi
    Annals of Telecommunications, 2019, 74 : 593 - 603
  • [35] A survey on authentication and access control for mobile networks: from 4G to 5G
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (9-10) : 593 - 603
  • [36] Securing Authentication for Mobile Networks, A Survey on 4G issues and 5G answers
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2018,
  • [37] Protocol Function Block Mapping of Software Defined Protocol for 5G Mobile Networks
    Wen, Ruihan
    Feng, Gang
    Tan, Wei
    Ni, Rui
    Qin, Shuang
    Wang, Gang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (07) : 1651 - 1665
  • [38] BC-AKA: Blockchain Based Asymmetric Authentication and Key Agreement Protocol for Distributed 5G Core Network
    Zhen Gao
    Dongbin Zhang
    Jiuzhi Zhang
    Zhao Liu
    Haoming Liu
    Ming Zhao
    China Communications, 2022, (06) : 66 - 76
  • [39] BC-AKA: Blockchain based asymmetric authentication and key agreement protocol for distributed 5G core network
    Gao, Zhen
    Zhang, Dongbin
    Zhang, Jiuzhi
    Liu, Zhao
    Liu, Haoming
    Zhao, Ming
    CHINA COMMUNICATIONS, 2022, 19 (06) : 66 - 76
  • [40] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234