Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device

被引:0
|
作者
Pari, S. Neelavathy [1 ]
Vasanth, Azhagu R. [1 ]
Amuthini, M. [1 ]
Balaji, M. [1 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai, Tamil Nadu, India
关键词
Cryptography; Asymmetric; 5G AKA; Activity monitoring;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The 5G security standard inherits good security features from the previous generations and also proposes some significant features to make 5G system more secure and open to meet the new stringent system requirements. Key exchange between the components shows about the network and it's authentication power. 5G AKA (Authentication and Key Agreement) has been standardized by 3rd Generation Partnership Project (3GPP) which is used for authentication of mobile network during handover. Several weakness has been identified in the current version of the 5G AKA protocol. Weakness identified in 5G AKA protocol are user localization, activity leakage, active attackers, and in the presence of malicious serving networks. Evolution of 5G AKA is from 4G EPS-AKA. The authentication in 4G EPS-AKA is taken in SN (Serving Network), in which Home Network is considered for generation of authentication vector. However in 5G final decision is taken by Home Network (HN) hence it uses sequence numbers to protect against reply attacks for every request from SN. This sequence numbers causes activity monitoring attacks. The main approach is the use of random numbers and create unique session. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. The session management has also been established with encryption technique to prevent personal details theft.
引用
收藏
页码:295 / 301
页数:7
相关论文
共 50 条
  • [21] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [22] Mobile Device Localization in 5G Wireless Networks
    Wang, Dandan
    Hosangadi, Gurudutt
    Monogioudis, Pantelis
    Rao, Anil
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 185 - 190
  • [23] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [24] Advanced 5G-TCP: Transport protocol for 5G Mobile Networks
    Petrov, Ivan
    Janevski, Toni
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 103 - 107
  • [25] Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain
    Haddad, Zaher
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Alasmary, Waleed
    Alsolami, Fawaz
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 2616 - 2627
  • [26] Research on 5G Mobile Communication Network Security Technology
    Zhan, Weishu
    Tao, Zhen
    2020 3RD INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY (CISAT) 2020, 2020, 1634
  • [27] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [28] Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model
    Xiao, Yuelei
    Gao, Shan
    ELECTRONICS, 2022, 11 (09)
  • [29] 5G device-to-device communication security and multipath routing solutions
    Aslihan Celik
    Jessica Tetzner
    Koushik Sinha
    John Matta
    Applied Network Science, 4
  • [30] 5G device-to-device communication security and multipath routing solutions
    Celik, Aslihan
    Tetzner, Jessica
    Sinha, Koushik
    Matta, John
    APPLIED NETWORK SCIENCE, 2019, 4 (01)