Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device

被引:0
|
作者
Pari, S. Neelavathy [1 ]
Vasanth, Azhagu R. [1 ]
Amuthini, M. [1 ]
Balaji, M. [1 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai, Tamil Nadu, India
关键词
Cryptography; Asymmetric; 5G AKA; Activity monitoring;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The 5G security standard inherits good security features from the previous generations and also proposes some significant features to make 5G system more secure and open to meet the new stringent system requirements. Key exchange between the components shows about the network and it's authentication power. 5G AKA (Authentication and Key Agreement) has been standardized by 3rd Generation Partnership Project (3GPP) which is used for authentication of mobile network during handover. Several weakness has been identified in the current version of the 5G AKA protocol. Weakness identified in 5G AKA protocol are user localization, activity leakage, active attackers, and in the presence of malicious serving networks. Evolution of 5G AKA is from 4G EPS-AKA. The authentication in 4G EPS-AKA is taken in SN (Serving Network), in which Home Network is considered for generation of authentication vector. However in 5G final decision is taken by Home Network (HN) hence it uses sequence numbers to protect against reply attacks for every request from SN. This sequence numbers causes activity monitoring attacks. The main approach is the use of random numbers and create unique session. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. The session management has also been established with encryption technique to prevent personal details theft.
引用
收藏
页码:295 / 301
页数:7
相关论文
共 50 条
  • [31] Evolving to 5G: A Fast and Near-optimal Request Routing Protocol for Mobile Core Networks
    He, Jun
    Song, Wei
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 4586 - 4591
  • [32] The 5G-AKA Authentication Protocol Privacy
    Koutsos, Adrien
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 464 - 479
  • [33] Routing Protocol for Device-to-Device Communication in SoftNet Towards 5G
    Rakshith, K.
    Rao, Mahesh
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 42 - 54
  • [34] Device-to-Device Assisted Mobile Cloud Framework for 5G Networks
    Ashraf, Muhammad Ikram
    Tamoor-ul-Hassan, Syed
    Mumtaz, Shahid
    Tsang, Kim Fung
    Rodriquez, Jonathan
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1020 - 1023
  • [35] Device-to-Device Communication for Mobile Multimedia in Emerging 5G Networks
    Liu, Jiajia
    Kato, Nei
    Ujikawa, Hirotaka
    Suzuki, Kenichi
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (05)
  • [36] SDN BASED DEVICE TO DEVICE COMMUNICATION ARCHITECTURE FOR 5G MOBILE NETWORKS
    Murtadha, Muayad K.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2021, 16 (04): : 3033 - 3047
  • [37] 5G Mobile
    Wang, Yi
    Li, Jian
    Huang, Lei
    Jing, Yao
    Georgakopoulos, Andreas
    Demestichas, Panagiotis
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2014, 9 (03): : 39 - 46
  • [38] Architectural Implementation of AES based 5G Security Protocol on FPGA
    Rahim, Usva
    Siddiqui, Muhammad Faisal
    Javed, Muhammad Awais
    Nafi, Nazmus
    2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2022, : 247 - 252
  • [39] A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol
    Cheng, Ya-Chu
    Shen, Chung-An
    IEEE ACCESS, 2022, 10 : 77679 - 77687
  • [40] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283