Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

被引:9
|
作者
Xiao, Yuelei [1 ,2 ]
Gao, Shan [3 ]
机构
[1] Xian Univ Post & Telecommun, Sch Modern Posts, Xian 710061, Peoples R China
[2] Shaanxi Prov Informat Engn Res Inst, Xian 710121, Peoples R China
[3] Xian Univ Post & Telecommunicat, Sch Comp, Xian 710061, Peoples R China
基金
中国国家自然科学基金;
关键词
5G-AKA'; mutual authentication; weak agreement; attack scenarios; location privacy; pre-shared key; perfect forward secrecy; challenge-response; timeout mechanism; AUTHENTICATION; SECURITY; SCHEME;
D O I
10.3390/electronics11091333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA'. In the 5G-AKA' protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge-response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA' protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA' protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA' protocol is efficient and is backward compatible with the 5G AKA protocol.
引用
收藏
页数:41
相关论文
共 50 条
  • [1] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [2] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [3] Dependency-Graph enabled Formal Analysis for 5G AKA Protocols: Assumption Propagation and Verification
    Yang, Jingda
    Wang, Ying
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 715 - 721
  • [4] AKA Protocol And Its Formal Analysis And Verification Using Ambient Calculus And Logics
    Zhang, Xiaopei
    Li, Xiang
    Luo, Wenjun
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 194 - 197
  • [5] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [6] Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques
    Ko, Yongho
    Pawana, I Wayan Adi Juliawan
    You, Ilsun
    Sensors, 2024, 24 (24)
  • [7] Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
    Zhang, Jingjing
    Yang, Lin
    Cao, Weipeng
    Wang, Qiang
    IEEE ACCESS, 2020, 8 : 23674 - 23688
  • [8] A Generic Construction for Efficient and Secure AKA Protocol in 5G Network
    Gupta, Shubham
    Parne, Balu
    Chaudhari, Narendra S.
    2018 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2018,
  • [9] Supporting 5G Service Orchestration with Formal Verification
    Backeman, Peter
    Kunnappilly, Ashalatha
    Seceleanu, Cristina
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (01) : 329 - 357
  • [10] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209