Formal verification of secondary authentication protocol for 5G secondary authentication

被引:2
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J.K.-K. [2 ]
Alhakeem M.S. [3 ]
机构
[1] School of Science and Technology, Middlesex University, London
[2] School of Computer and Engineering, University of West London, London
[3] Naif Arab University for Security Sciences, Riyadh
来源
关键词
5G; Applied Pi calculus; Formal methods; ProVerif; Secondary authentication; Security protocol; Services;
D O I
10.1504/IJSN.2021.119379
中图分类号
学科分类号
摘要
The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol’s security properties. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:223 / 234
页数:11
相关论文
共 50 条
  • [21] Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
    Miao, Junfeng
    Wang, Zhaoshun
    Ning, Xin
    Xiao, Nan
    Cai, Weiwei
    Liu, Ruimin
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 1852 - 1869
  • [22] Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks
    Sriraam, S., V
    Sajeev, Suraj
    Joshi, Rohit
    Vithalkar, Amogh
    Bansal, Manish
    Jagadeesh, Harshan
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [23] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329
  • [24] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283
  • [25] Authentication mechanisms in the 5G system
    Huang X.
    Yoshizawa T.
    Baskaran S.B.M.
    Journal of ICT Standardization, 2021, 9 (02): : 61 - 78
  • [26] Formal Analysis and Verification for Three-Party Authentication Protocol of RFID
    Chen, Jia
    Xiao, Meihua
    Yang, Ke
    Li, Wei
    Zhong, Xiaomei
    THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 46 - 60
  • [27] Implicit Secondary Authentication for Sustainable SMS Authentication
    Ryu, Gwonsang
    Kim, Seung-Hyun
    Choi, Daeseon
    SUSTAINABILITY, 2019, 11 (01)
  • [28] Introducing CafeOB J (5) : Verification of an authentication protocol
    Ogata, Kazuhiro
    Futatsugi, Kokichi
    Nakamura, Masaki
    Computer Software, 2009, 26 (01) : 71 - 83
  • [29] A secure and efficient handover authentication and key management protocol for 5G networks
    Huang, Jia Qi
    Qian, Yi
    Journal of Communications and Information Networks, 2020, 5 (01) : 40 - 49
  • [30] Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Miao J.
    Wang Z.
    Wang M.
    Feng X.
    Xiao N.
    Sun X.
    Wireless Communications and Mobile Computing, 2023, 2023