Formal verification of secondary authentication protocol for 5G secondary authentication

被引:2
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J.K.-K. [2 ]
Alhakeem M.S. [3 ]
机构
[1] School of Science and Technology, Middlesex University, London
[2] School of Computer and Engineering, University of West London, London
[3] Naif Arab University for Security Sciences, Riyadh
来源
关键词
5G; Applied Pi calculus; Formal methods; ProVerif; Secondary authentication; Security protocol; Services;
D O I
10.1504/IJSN.2021.119379
中图分类号
学科分类号
摘要
The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol’s security properties. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:223 / 234
页数:11
相关论文
共 50 条
  • [1] A Formal Analysis of 5G Authentication
    Basin, David
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    Stettler, Vincent
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1383 - 1396
  • [2] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [3] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [4] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [5] Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
    Zhang, Jingjing
    Yang, Lin
    Cao, Weipeng
    Wang, Qiang
    IEEE ACCESS, 2020, 8 : 23674 - 23688
  • [6] A secondary authentication algorithm of 5G communication with PUF terminal for power service
    Shao, Weiping
    Li, Yong
    Qiu, Jinyi
    Wang, Meiying
    2024 3RD INTERNATIONAL CONFERENCE ON ENERGY AND ELECTRICAL POWER SYSTEMS, ICEEPS 2024, 2024, : 1287 - 1290
  • [7] An SM9-Based Secondary Authentication Framework for 5G Technology
    Wang, Rui
    Liu, Xin
    Liu, Donglan
    Zhang, Hao
    Ma, Lei
    Wang, Yong
    Liu, Han
    Chen, Jianfei
    Li, Zhenghao
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (06)
  • [8] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [9] Design and Formal Verification of a VANET Lightweight Authentication Protocol
    Zhao, Guolei
    Wang, Ruinyun
    Wang, Xuejian
    Zhu, Xianwei
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 513 - 517
  • [10] An Improved Secure Authentication Protocol for WiMAX with Formal Verification
    Rai, Anjani Kumar
    Mishra, Shivendu
    Tripathi, Pramod Narayan
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +