Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

被引:0
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J. [2 ]
机构
[1] School of Science and Technology, Middlesex University, The Burroughs, Hendon, London
[2] School of Computing and Engineering, University of West London, St Mary's Rd, Ealing, London
来源
Array | 2022年 / 16卷
关键词
5G; Applied pi calculus; Authentication; EAP-AKA; Formal methods; Performance evaluation; ProVerif; Security protocol; Verification;
D O I
10.1016/j.array.2022.100254
中图分类号
学科分类号
摘要
The end user's Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP-AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol's performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results. © 2022 The Author(s)
引用
收藏
相关论文
共 50 条
  • [31] Security Analysis of 3GPP (LTE) - WLAN Interworking and A New Local Authentication Method based on EAP-AKA
    El Idrissi, Younes El Hajjaji
    Zahid, Noureddine
    Jedra, Mohamed
    2012 INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2012, : 137 - 142
  • [32] 5G Network Slicing: A Security Overview
    Olimid, Ruxandra F.
    Nencioni, Gianfranco
    IEEE ACCESS, 2020, 8 : 99999 - 100009
  • [33] New Security Challenges in the 5G Network
    Hidano, Seira
    Pecovsky, Martin
    Kiyomoto, Shinsaku
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 619 - 630
  • [34] Security and Protocol Exploit Analysis of the 5G Specifications
    Jover, Roger Piqueras
    Marojevic, Vuk
    IEEE ACCESS, 2019, 7 : 24956 - 24963
  • [35] 5G NETWORK ACCESS SECURITY MODEL THROUGH DEEP NEURAL NETWORKS CLUSTERING
    Ayala, Sebastian Camilo Vanegas
    Parra, Octavio Jose Salcedo
    Forero, Brayan Leonardo Sierra
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (05): : 3555 - 3569
  • [36] Radio Access Network Slicing in 5G
    Gong, Jinjin
    Ge, Lu
    Su, Xin
    Zeng, Jie
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 207 - 210
  • [37] Toward a secure access to 5G network
    Liu, Fuwen
    Peng, Jin
    Zuo, Min
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1121 - 1128
  • [38] 5G and Radio Access Network Architecture
    Krajnovic, Sinisa
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS CONTEL 2017, 2017, : 1 - 1
  • [39] A Hint-based Random Access Protocol for mMTC in 5G Mobile Network
    Xu, Yining
    Ren, Yi
    Lin, Kate Ching-Ju
    Tseng, Yu-Chee
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 388 - 396
  • [40] BC-AKA: Blockchain Based Asymmetric Authentication and Key Agreement Protocol for Distributed 5G Core Network
    Zhen Gao
    Dongbin Zhang
    Jiuzhi Zhang
    Zhao Liu
    Haoming Liu
    Ming Zhao
    China Communications, 2022, 19 (06) : 66 - 76