Security Vulnerabilities in Handover Authentication Mechanism of 5G Network

被引:0
|
作者
Gupta, Shubham [1 ]
Parne, Balu L. [2 ]
Chaudhari, Narendra S. [1 ,3 ]
机构
[1] Visvesvaraya Natl Inst Technol, Dept Comp Sci & Engn, Nagpur 440010, Maharashtra, India
[2] Vellore Inst Technol VIT AP, Dept Comp Sci & Engn, Amravati 522237, Andhra Pradesh, India
[3] Indian Inst Technol, Indore 453552, Madhya Pradesh, India
关键词
5G handover; handover key mechanism; security weakness; key hierarchy; inter-gNB handover; security counter-measures;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and pre-distribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.
引用
收藏
页码:369 / 374
页数:6
相关论文
共 50 条
  • [41] Authentication Handover and Privacy Protection in 5G HetNets Using Software-Defined Networking
    Duan, Xiaoyu
    Wang, Xianbin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 28 - 35
  • [42] Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Abeka, Silvance Onyango
    [J]. 2020 IEEE 2ND GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (IEEE GPECOM2020), 2020, : 339 - 344
  • [43] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [44] Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks
    Krishnan, Prabhakar
    Jain, Kurunandan
    Alluhaidan, Ala-Saleh D.
    Prabu, P.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [45] A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
    Yan, Xiaobei
    Ma, Maode
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [46] Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
    Farash, Mohammad Sabzinejad
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Khattak, Muazzam A. Khan
    Albeshri, Aiiad
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (02): : 205 - 218
  • [47] A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks
    Yan, Xiaobei
    Ma, Maude
    Su, Rong
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1678 - 1684
  • [48] An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNet
    Monira, Shaikhum
    Kabir, Upama
    Jahan, Mosarrat
    Paul, Uchswas
    [J]. 2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 25 - 30
  • [49] A formal security analysis of the fast authentication procedure based on the security context in 5G networks
    Zhiwei Cui
    Baojiang Cui
    Li Su
    Haitao Du
    Jie Xu
    Junsong Fu
    [J]. Soft Computing, 2024, 28 : 1865 - 1881
  • [50] A formal security analysis of the fast authentication procedure based on the security context in 5G networks
    Cui, Zhiwei
    Cui, Baojiang
    Su, Li
    Du, Haitao
    Xu, Jie
    Fu, Junsong
    [J]. SOFT COMPUTING, 2024, 28 (03) : 1865 - 1881