The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

被引:3
|
作者
Fei, Teng [1 ]
Wang, Wenye [1 ]
机构
[1] NC State Univ, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Long-term evolution (LTE); Authentication protocol; Analysis and verification;
D O I
10.1016/j.comnet.2023.109685
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Long-Term Evolution (LTE)/5G network connects much of the world's population to provide subscriber's voice calls and mobile data delivery, with security provided by the Authentication and Key Agreement (AKA) defined by 3GPP, which makes the LTE/5G network more secure than all its predecessors. Primarily due to the access limitations of LTE systems, the vulnerabilities of AKA protocol and potential attacks have not received much investigation, which is essential to LTE users with a tremendous amount of cellular services. In this study, we focus on two questions: (i) what are the vulnerabilities that can be exploited to carry out attacks in practice? and (ii) how to design an enhanced AKA protocol against such attacks? We examine the detailed procedures of Evolved Packet System (EPS)-AKA protocol by 3GPP, and have identified three types of attacks with respect to catching, location tracking, and jamming. We have designed and implemented attacks with commercial equipment to evaluate their threats in practice. In addition, we propose an enhanced AKA protocol that essentially relies on asymmetric encryption rather than symmetric in the AKA protocol and additional digital signatures to countermeasure these attacks. Finally, we verified our solution through formal verification to prove that our solution can mitigate the newly found vulnerabilities.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
    Balu L. Parne
    Shubham Gupta
    Narendra S. Chaudhari
    Peer-to-Peer Networking and Applications, 2019, 12 : 1156 - 1177
  • [42] PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (05) : 1156 - 1177
  • [43] LTE eNB Traffic Analysis and Key Techniques Towards 5G Mobile Networks
    Iliev, T. B.
    Mihaylov, Gr. Y.
    Bikov, T. D.
    Ivanova, E. P.
    Stoyanov, I. S.
    Radev, D. I.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 497 - 500
  • [44] CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    SYMMETRY-BASEL, 2021, 13 (04):
  • [45] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)
  • [46] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [47] A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    Liyange, Madhusanka
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [48] Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL
    Zhang, Tong
    Xiao, Meihua
    Ouyang, Ri
    THEORETICAL COMPUTER SCIENCE, NCTCS 2021, 2021, 1494 : 222 - 233
  • [49] Multipath transport control protocol for 5G mobile augmented reality networks
    Khan, Tariq
    Sohail, Adnan
    Qureshi, Kashif Naseer
    Iqbal, Saleem
    Jeon, Gwanggil
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (05)
  • [50] Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
    Sharma, Vishal
    You, Ilsun
    Leu, Fang-Yie
    Atiquzzaman, Mohammed
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 102 : 38 - 57