Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device

被引:0
|
作者
Pari, S. Neelavathy [1 ]
Vasanth, Azhagu R. [1 ]
Amuthini, M. [1 ]
Balaji, M. [1 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai, Tamil Nadu, India
关键词
Cryptography; Asymmetric; 5G AKA; Activity monitoring;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The 5G security standard inherits good security features from the previous generations and also proposes some significant features to make 5G system more secure and open to meet the new stringent system requirements. Key exchange between the components shows about the network and it's authentication power. 5G AKA (Authentication and Key Agreement) has been standardized by 3rd Generation Partnership Project (3GPP) which is used for authentication of mobile network during handover. Several weakness has been identified in the current version of the 5G AKA protocol. Weakness identified in 5G AKA protocol are user localization, activity leakage, active attackers, and in the presence of malicious serving networks. Evolution of 5G AKA is from 4G EPS-AKA. The authentication in 4G EPS-AKA is taken in SN (Serving Network), in which Home Network is considered for generation of authentication vector. However in 5G final decision is taken by Home Network (HN) hence it uses sequence numbers to protect against reply attacks for every request from SN. This sequence numbers causes activity monitoring attacks. The main approach is the use of random numbers and create unique session. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. The session management has also been established with encryption technique to prevent personal details theft.
引用
收藏
页码:295 / 301
页数:7
相关论文
共 50 条
  • [41] Protocol Function Block Mapping of Software Defined Protocol for 5G Mobile Networks
    Wen, Ruihan
    Feng, Gang
    Tan, Wei
    Ni, Rui
    Qin, Shuang
    Wang, Gang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (07) : 1651 - 1665
  • [42] On the Efficacy of New Privacy Attacks against 5G AKA
    Khan, Haibat
    Martin, Keith M.
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 431 - 438
  • [43] Power Control Schemes for Device-to-Device Communications in 5G Mobile network
    Iliev, T. B.
    Mihaylov, Gr. Y.
    Ivanova, E. P.
    Stoyanov, I. S.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 416 - 419
  • [44] On the Measurement of Radiated Power for 5G Mobile Device with Spectrum Analyzer
    Luo, Jun
    Mendivil, Edwin
    Christopher, Michael
    Chou, Te-Shun
    2020 14TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP 2020), 2020,
  • [45] Integration and Evaluation of Antenna Systems for 5G mmWave Mobile Device
    Zhao, Kun
    Zander, Olof
    Bolin, Thomas
    Ying, Zhinong
    Zhang, Shuai
    Pedersen, Gert Frolund
    2019 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION AND USNC-URSI RADIO SCIENCE MEETING, 2019, : 1075 - 1076
  • [46] Towards 5G Security
    Horn, Guenther
    Schneider, Peter
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1165 - 1170
  • [47] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3682 - 3722
  • [48] 5G Network and Security
    Jinsong, Ma
    Yamin, Mohammad
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 249 - 254
  • [49] 5G, Security, and You
    Kshetri, Nir
    Voas, Jeffrey
    COMPUTER, 2020, 53 (03) : 62 - 66
  • [50] Fast-Forward with 5G The next generation of wireless networks is coming
    Cohen, Rachel S.
    Air Force Magazine, 2019, 102 (07): : 41 - 45