Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

被引:9
|
作者
Xiao, Yuelei [1 ,2 ]
Gao, Shan [3 ]
机构
[1] Xian Univ Post & Telecommun, Sch Modern Posts, Xian 710061, Peoples R China
[2] Shaanxi Prov Informat Engn Res Inst, Xian 710121, Peoples R China
[3] Xian Univ Post & Telecommunicat, Sch Comp, Xian 710061, Peoples R China
基金
中国国家自然科学基金;
关键词
5G-AKA'; mutual authentication; weak agreement; attack scenarios; location privacy; pre-shared key; perfect forward secrecy; challenge-response; timeout mechanism; AUTHENTICATION; SECURITY; SCHEME;
D O I
10.3390/electronics11091333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA'. In the 5G-AKA' protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge-response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA' protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA' protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA' protocol is efficient and is backward compatible with the 5G AKA protocol.
引用
收藏
页数:41
相关论文
共 50 条
  • [21] A Multi-Party Contract Signing Protocol and its Formal Analysis in Strand Space Model
    Li, Xiangdong
    Wang, Zhenyu
    Chen, Li
    Wang, Qingxian
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 556 - 559
  • [22] Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device
    Pari, S. Neelavathy
    Vasanth, Azhagu R.
    Amuthini, M.
    Balaji, M.
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC 2019), 2019, : 295 - 301
  • [23] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    Array, 2022, 16
  • [24] PPSE: Privacy Preservation and Security Efficient AKA Protocol for 5G Communication Networks
    Parne, Balu L.
    Gupta, Shubham
    Gandhi, Kaneesha
    Meena, Shubhangi
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [25] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [26] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [27] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [28] Analysis of LEACH Protocol(s) using Formal Verification
    Ihsan, A.
    Saghar, K.
    Fatima, T.
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
  • [29] A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
    Jiang Rui
    CHINA COMMUNICATIONS, 2010, 7 (04) : 23 - 28
  • [30] Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model
    Mukhamedov, A
    Kremer, S
    Ritter, E
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 255 - 269