5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks

被引:11
|
作者
Xiao, Yuelei [1 ,2 ]
Wu, Yang [3 ]
机构
[1] Xian Univ Post & Telecommun, Sch Modern Posts, Xian 710061, Peoples R China
[2] Shaanxi Prov Informat Engn Res Inst, Xian 710075, Peoples R China
[3] Xian Univ Post & Telecommun, Sch Comp, Xian 710061, Peoples R China
基金
中国国家自然科学基金;
关键词
AKA (authentication and key agreement); 5G AKA; 5G-IPAKA; mixed strand space model; pre-shared key; challenge-response; timeout mechanism;
D O I
10.3390/info13030125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the latest version of the 5G AKA protocol, the main improvements include that the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key as the pre-shared key, the challenge-response mechanism for the serving network (SN) is added, the mutual authentication and key confirmation occurs between the UE and the SN, and the message authentication code (MAC) failure procedure is replaced with a timeout mechanism on the HN. Then, the 5G-IPAKA protocol is proven secure in the mixed strand space model for mixed protocols. Further discussion and comparative analysis show that the 5G-IPAKA protocol can overcome the above shortcomings of the latest version of the 5G AKA protocol, and is better than the recently improved 5G AKA protocols. Additionally, the 5G-IPAKA protocol is efficient and backward-compatible.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [32] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [33] An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Ali, Borhanuddin M.
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 502 - 507
  • [34] Secure and Efficient Authentication and Key Agreement Scheme for Multicast Services in 5G Vehicular to Everything
    Zhang, Yinghui
    Li, Guoteng
    Han, Gang
    Cao, Jin
    Zheng, Dong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (07): : 3026 - 3035
  • [35] Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks
    Roychoudhury, Probidita
    Roychoudhury, Basav
    Saikia, Dilip Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 21
  • [36] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194
  • [37] SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network
    Shubham Gupta
    Balu L. Parne
    Narendra S. Chaudhari
    Sandeep Saxena
    Wireless Personal Communications, 2022, 122 : 2925 - 2962
  • [38] SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network
    Gupta, Shubham
    Parne, Balu L.
    Chaudhari, Narendra S.
    Saxena, Sandeep
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 2925 - 2962
  • [39] Secure and effective authentication for 5G networks (SEA-5G) using blockchain
    R. Bala
    R. Manoharan
    Journal of Ambient Intelligence and Humanized Computing, 2025, 16 (1) : 51 - 66
  • [40] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)