Security Vulnerabilities in Handover Authentication Mechanism of 5G Network

被引:0
|
作者
Gupta, Shubham [1 ]
Parne, Balu L. [2 ]
Chaudhari, Narendra S. [1 ,3 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[2] Vellore Inst Technol VIT AP, Dept Comp Sci & Engn, Amravati 522237, Andhra Pradesh, India
[3] Indian Inst Technol, Indore 453552, Madhya Pradesh, India
关键词
5G handover; handover key mechanism; security weakness; key hierarchy; inter-gNB handover; security counter-measures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and pre-distribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [21] 5G-Hander: A network service for handover detection in 5G networks
    Grasso, Christian
    Schembra, Giovanni
    [J]. INTERNET TECHNOLOGY LETTERS, 2019, 2 (04)
  • [22] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [23] A Security Enhanced 5G Authentication Scheme for Insecure Channel
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Cheng, Xiaotao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (03): : 711 - 713
  • [24] A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain
    Chen, Zhonglin
    Chen, Shanzhi
    Xu, Hui
    Hu, Bo
    [J]. IEEE ACCESS, 2018, 6 : 55372 - 55379
  • [25] A survey on various handover technologies in 5G network using the modular handover modules
    Kulkarni, Sanjay Sudhir
    Bavarva, Arjav A.
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 267 - 290
  • [26] 5G Network Slicing: A Security Overview
    Olimid, Ruxandra F.
    Nencioni, Gianfranco
    [J]. IEEE ACCESS, 2020, 8 : 99999 - 100009
  • [27] New Security Challenges in the 5G Network
    Hidano, Seira
    Pecovsky, Martin
    Kiyomoto, Shinsaku
    [J]. COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 619 - 630
  • [28] Physical Layer Security Assisted 5G Network Security
    Pan, Fei
    Jiang, Yixin
    Wen, Hong
    Liao, Runfa
    Xu, Aidong
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [29] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Susanto, Heru
    Gu, Cheng-Yan
    You, Ilsun
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1650 - 1667
  • [30] A Fault Tolerant Mechanism for UE Authentication in 5G Networks
    Fang-Yie Leu
    Kun-Lin Tsai
    Heru Susanto
    Cheng-Yan Gu
    Ilsun You
    [J]. Mobile Networks and Applications, 2021, 26 : 1650 - 1667