Formal verification of secondary authentication protocol for 5G secondary authentication

被引:2
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J.K.-K. [2 ]
Alhakeem M.S. [3 ]
机构
[1] School of Science and Technology, Middlesex University, London
[2] School of Computer and Engineering, University of West London, London
[3] Naif Arab University for Security Sciences, Riyadh
来源
关键词
5G; Applied Pi calculus; Formal methods; ProVerif; Secondary authentication; Security protocol; Services;
D O I
10.1504/IJSN.2021.119379
中图分类号
学科分类号
摘要
The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol’s security properties. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:223 / 234
页数:11
相关论文
共 50 条
  • [41] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [42] Towards a formal verification of an authentication protocol using non-monotonic logic
    Das, Manik Lal
    Narasimhan, V. Lakshmi
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 545 - 550
  • [43] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [44] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Bae Woo-Sik
    Wireless Personal Communications, 2014, 79 : 2595 - 2609
  • [45] CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    SYMMETRY-BASEL, 2021, 13 (04):
  • [46] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [47] A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Braeken, An
    Liyanage, Madhusanka
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1324 - 1331
  • [48] A Blockchain-assisted Group Handover Authentication Protocol for 5G Wireless Networks
    Ma, Ronghao
    Zhou, Jianhong
    Ma, Maode
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 78 - 83
  • [49] Applying SPIN Checker on 5G EAP-TLS Authentication Protocol Analysis
    Wang, Qianli
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2024, 21 (01) : 21 - 36
  • [50] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)