Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

被引:0
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J. [2 ]
机构
[1] School of Science and Technology, Middlesex University, The Burroughs, Hendon, London
[2] School of Computing and Engineering, University of West London, St Mary's Rd, Ealing, London
来源
Array | 2022年 / 16卷
关键词
5G; Applied pi calculus; Authentication; EAP-AKA; Formal methods; Performance evaluation; ProVerif; Security protocol; Verification;
D O I
10.1016/j.array.2022.100254
中图分类号
学科分类号
摘要
The end user's Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP-AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol's performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results. © 2022 The Author(s)
引用
收藏
相关论文
共 50 条
  • [41] Physical Layer Security Assisted 5G Network Security
    Pan, Fei
    Jiang, Yixin
    Wen, Hong
    Liao, Runfa
    Xu, Aidong
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [42] Location Privacy, 5G AKA, and Enhancements
    Damir, Mohamed Taoufiq
    Niemi, Valtteri
    SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 40 - 57
  • [43] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [44] BC-AKA: Blockchain based asymmetric authentication and key agreement protocol for distributed 5G core network
    Gao, Zhen
    Zhang, Dongbin
    Zhang, Jiuzhi
    Liu, Zhao
    Liu, Haoming
    Zhao, Ming
    CHINA COMMUNICATIONS, 2022, 19 (06) : 66 - 76
  • [45] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [46] Network resource abstraction for 5G radio access network
    Nakura, Kenichi
    Suehiro, Takeshi
    Nagasawa, Akiko
    Hirano, Yukio
    Ishida, Kazuyuki
    Nakagawa, Junichi
    METRO AND DATA CENTER OPTICAL NETWORKS AND SHORT-REACH LINKS II, 2019, 10946
  • [47] 3G-WLAN互联网络中EAP-AKA协议的分析与改进
    许万福
    侯惠芳
    计算机工程与应用 , 2010, (32) : 81 - 83+151
  • [48] Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol
    Moatemri, Maroua
    Eltaief, Hamdi
    Youssef, Habib
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 993 - 998
  • [49] Applying SPIN Checker on 5G EAP-TLS Authentication Protocol Analysis
    Wang, Qianli
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2024, 21 (01) : 21 - 36
  • [50] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266