Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

被引:9
|
作者
Xiao, Yuelei [1 ,2 ]
Gao, Shan [3 ]
机构
[1] Xian Univ Post & Telecommun, Sch Modern Posts, Xian 710061, Peoples R China
[2] Shaanxi Prov Informat Engn Res Inst, Xian 710121, Peoples R China
[3] Xian Univ Post & Telecommunicat, Sch Comp, Xian 710061, Peoples R China
基金
中国国家自然科学基金;
关键词
5G-AKA'; mutual authentication; weak agreement; attack scenarios; location privacy; pre-shared key; perfect forward secrecy; challenge-response; timeout mechanism; AUTHENTICATION; SECURITY; SCHEME;
D O I
10.3390/electronics11091333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA'. In the 5G-AKA' protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge-response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA' protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA' protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA' protocol is efficient and is backward compatible with the 5G AKA protocol.
引用
收藏
页数:41
相关论文
共 50 条
  • [31] Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space
    Wang, Hong
    Ma, Jianping
    Chen, Bo
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 469 - +
  • [32] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [33] Formal verification of a group membership protocol using model checking
    Rosset, Valerio
    Souto, Pedro F.
    Vasques, Francisco
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 471 - 488
  • [34] 5G Authentication Protocol Based on Sub-mode Switching Operation and Its Formal Analysis
    Liu Y.-B.
    Zhou G.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (08): : 3708 - 3725
  • [35] A New Tracking-Attack Scenario Based on the Vulnerability and Privacy Violation of 5G AKA Protocol
    Cheng, Ya-Chu
    Shen, Chung-An
    IEEE ACCESS, 2022, 10 : 77679 - 77687
  • [36] Security analysis of Kerberos protocol based on the strand space model
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
  • [37] The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation
    Miller, Rhys
    Boureanu, Ioana
    Wesemeyer, Stephan
    Newton, Christopher J. P.
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 237 - 251
  • [38] A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    Liyange, Madhusanka
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [39] Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
    Patel, Reema
    Borisaniya, Bhavesh
    Patel, Avi
    Patel, Dhiren
    Rajarajan, Muttukrishnan
    Zisman, Andrea
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 152 - +
  • [40] Security and Protocol Exploit Analysis of the 5G Specifications
    Jover, Roger Piqueras
    Marojevic, Vuk
    IEEE ACCESS, 2019, 7 : 24956 - 24963