Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

被引:0
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J. [2 ]
机构
[1] School of Science and Technology, Middlesex University, The Burroughs, Hendon, London
[2] School of Computing and Engineering, University of West London, St Mary's Rd, Ealing, London
来源
Array | 2022年 / 16卷
关键词
5G; Applied pi calculus; Authentication; EAP-AKA; Formal methods; Performance evaluation; ProVerif; Security protocol; Verification;
D O I
10.1016/j.array.2022.100254
中图分类号
学科分类号
摘要
The end user's Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP-AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol's performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results. © 2022 The Author(s)
引用
收藏
相关论文
共 50 条
  • [21] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209
  • [22] Security Analysis of 5G Network
    Khan, John A.
    Chowdhury, Minhaz
    2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 1 - 6
  • [23] A NEW FAST RE-AUTHENTICATION METHOD FOR THE 3G-WLAN INTERWORKING BASED ON EAP-AKA
    El Idrissi, Younes El Hajjaji
    Zahid, Noureddine
    Jedra, Mohamed
    2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [24] 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
    You, Ilsun
    Kim, Gunwoo
    Shin, Seonghan
    Kwon, Hoseok
    Kim, Jongkil
    Baek, Joonsang
    SENSORS, 2024, 24 (01)
  • [25] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    COMPUTER NETWORKS, 2023, 228
  • [26] A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network Coexistence
    Cui, Zhiwei
    Cui, Baojiang
    Xu, Jie
    Fu, Junsong
    INFORMATION SYSTEMS FRONTIERS, 2025,
  • [27] Implementation of Efficient 5G AKA Protocol for Light-Weight Environment
    Cho, Seonghwan
    Yeom, Cheolmin
    Won, Yoojae
    SUSTAINABILITY, 2021, 13 (16)
  • [28] Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
    Wang, Yuchen
    Zhang, Zhenfeng
    Xie, Yongquan
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3595 - 3612
  • [29] Device-to-device group authentication compatible with 5G AKA protocol
    Braeken, An
    COMPUTER NETWORKS, 2021, 201
  • [30] Security-as-a-Function in 5G Network: Implementation and Performance Evaluation
    Malik, Shivank
    Bera, Samaresh
    2024 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, SPCOM 2024, 2024,