Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

被引:9
|
作者
Xiao, Yuelei [1 ,2 ]
Gao, Shan [3 ]
机构
[1] Xian Univ Post & Telecommun, Sch Modern Posts, Xian 710061, Peoples R China
[2] Shaanxi Prov Informat Engn Res Inst, Xian 710121, Peoples R China
[3] Xian Univ Post & Telecommunicat, Sch Comp, Xian 710061, Peoples R China
基金
中国国家自然科学基金;
关键词
5G-AKA'; mutual authentication; weak agreement; attack scenarios; location privacy; pre-shared key; perfect forward secrecy; challenge-response; timeout mechanism; AUTHENTICATION; SECURITY; SCHEME;
D O I
10.3390/electronics11091333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA'. In the 5G-AKA' protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge-response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA' protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA' protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA' protocol is efficient and is backward compatible with the 5G AKA protocol.
引用
收藏
页数:41
相关论文
共 50 条
  • [41] Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion
    Cremers, Cas
    Dehnel-Wild, Martin
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [42] SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis
    Karim, Imtiaz
    Mubasshir, Kazi Samin
    Rahman, Mirza Masfiqur
    Bertino, Elisa
    13TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING AND THE 3RD CONFERENCE OF THE ASIA-PACIFIC CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, IJCNLP-AACL 2023, 2023, : 20 - 38
  • [43] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [44] Formal Analysis of 5G Authentication and Key Management for Applications (AKMA)
    Yang, Tengshun
    Wang, Shuling
    Zhan, Bohua
    Zhan, Naijun
    Li, Jinghui
    Xiang, Shuangqing
    Xiang, Zhan
    Mao, Bifei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 126
  • [45] Formal Analysis of Access Control Mechanism of 5G Core Network
    Akon, Mujtahid
    Yang, Tianchang
    Dong, Yilu
    Hussain, Syed Rafiul
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 666 - 680
  • [46] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [47] BC-AKA: Blockchain Based Asymmetric Authentication and Key Agreement Protocol for Distributed 5G Core Network
    Zhen Gao
    Dongbin Zhang
    Jiuzhi Zhang
    Zhao Liu
    Haoming Liu
    Ming Zhao
    ChinaCommunications, 2022, 19 (06) : 66 - 76
  • [48] TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks
    Liu, Yibing
    Huo, Lijun
    Zhou, Gang
    IET INFORMATION SECURITY, 2022, 16 (03) : 193 - 207
  • [49] BC-AKA: Blockchain based asymmetric authentication and key agreement protocol for distributed 5G core network
    Gao, Zhen
    Zhang, Dongbin
    Zhang, Jiuzhi
    Liu, Zhao
    Liu, Haoming
    Zhao, Ming
    CHINA COMMUNICATIONS, 2022, 19 (06) : 66 - 76
  • [50] A Formal Optimization Model for 5G Mobile Network Slice Resource Allocation
    Fendt, Andrea
    Mannweiler, Christian
    Schmelz, Lars Christoph
    Bauer, Bernhard
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 101 - 106