Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device

被引:0
|
作者
Pari, S. Neelavathy [1 ]
Vasanth, Azhagu R. [1 ]
Amuthini, M. [1 ]
Balaji, M. [1 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai, Tamil Nadu, India
关键词
Cryptography; Asymmetric; 5G AKA; Activity monitoring;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The 5G security standard inherits good security features from the previous generations and also proposes some significant features to make 5G system more secure and open to meet the new stringent system requirements. Key exchange between the components shows about the network and it's authentication power. 5G AKA (Authentication and Key Agreement) has been standardized by 3rd Generation Partnership Project (3GPP) which is used for authentication of mobile network during handover. Several weakness has been identified in the current version of the 5G AKA protocol. Weakness identified in 5G AKA protocol are user localization, activity leakage, active attackers, and in the presence of malicious serving networks. Evolution of 5G AKA is from 4G EPS-AKA. The authentication in 4G EPS-AKA is taken in SN (Serving Network), in which Home Network is considered for generation of authentication vector. However in 5G final decision is taken by Home Network (HN) hence it uses sequence numbers to protect against reply attacks for every request from SN. This sequence numbers causes activity monitoring attacks. The main approach is the use of random numbers and create unique session. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. The session management has also been established with encryption technique to prevent personal details theft.
引用
收藏
页码:295 / 301
页数:7
相关论文
共 50 条
  • [1] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209
  • [2] Device-to-device group authentication compatible with 5G AKA protocol
    Braeken, An
    COMPUTER NETWORKS, 2021, 201
  • [3] 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
    You, Ilsun
    Kim, Gunwoo
    Shin, Seonghan
    Kwon, Hoseok
    Kim, Jongkil
    Baek, Joonsang
    SENSORS, 2024, 24 (01)
  • [4] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    COMPUTER NETWORKS, 2023, 228
  • [5] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    Array, 2022, 16
  • [6] PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks
    Parne, Balu L.
    Gupta, Shubham
    Gandhi, Kaneesha
    Meena, Shubhangi
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [7] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [8] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [9] A Fast and Secure AKA Protocol for B5G
    Wu, Jung-Hsien
    Yang, Jie-Yu
    Chang, Yu-Ching
    Sun, Min-Te
    51ST INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS PROCEEDINGS, ICPP 2022, 2022,
  • [10] Security Analysis of 5G Network EAP-AKA' Protocol Based on Lowe's Taxonomy
    Liu Caixia
    Hu Xinxin
    Liu Shuxin
    You Wei
    Zhao Yu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (08) : 1800 - 1807