Skip to main content
Erschienen in: Telecommunication Systems 3/2021

29.07.2021

A new authentication and key agreement protocol for 5G wireless networks

verfasst von: Tian Liu, Fan Wu, Xiong Li, Chaoyang Chen

Erschienen in: Telecommunication Systems | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP group has standardized the AKA protocol for 5G mobile communication systems. Even though 5G AKA protocol has improved security compared with 3G and 4G AKA protocols, several studies have shown that some critical goals are still not fulfilled, such as violation of untracebility and lack of session key confirmation. In this article, we propose a security enhanced AKA protocol for 5G to overcome the previous identified weaknesses. In our protocol, random number based challenge-response mechanism is used to resist replay attacks, which also saves the communication cost since our protocol has no sequence number de-synchronization problem. Besides, our protocol guarantees the feature of session key confirmation, which allows the subscriber and serving network confirm that they share a session key after successful authentication. Through the formal verification of Proverif, the security of our proposed protocol is proved. Moreover, elliptic-curve Diffie–Hellman mechanism is adopted by our protocol, and therefore the property of perfect forward secrecy can be achieved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Physical Communication, 18, 64–84.CrossRef Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Physical Communication, 18, 64–84.CrossRef
2.
Zurück zum Zitat Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues, J. J. (2019). Fog computing for smart grid systems in the 5G environment: Challenges and solutions. IEEE Wireless Communications, 26(3), 47–53.CrossRef Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues, J. J. (2019). Fog computing for smart grid systems in the 5G environment: Challenges and solutions. IEEE Wireless Communications, 26(3), 47–53.CrossRef
3.
Zurück zum Zitat Lu, R., Zhang, L., Ni, J., & Fang, Y. (2020). 5G vehicle-to-everything services: Gearing up for security and privacy. Proceedings of the IEEE, 108(2), 373–389.CrossRef Lu, R., Zhang, L., Ni, J., & Fang, Y. (2020). 5G vehicle-to-everything services: Gearing up for security and privacy. Proceedings of the IEEE, 108(2), 373–389.CrossRef
4.
Zurück zum Zitat Lai, C., Lu, R., Zheng, D., & Shen, X. S. (2020). Security and privacy challenges in 5G-enabled vehicular networks. IEEE Network, 34(2), 37–45.CrossRef Lai, C., Lu, R., Zheng, D., & Shen, X. S. (2020). Security and privacy challenges in 5G-enabled vehicular networks. IEEE Network, 34(2), 37–45.CrossRef
5.
Zurück zum Zitat He, D., Zhang, Y., Wang, D., & Choo, K. K. R. (2020). Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE p1363 standard for public key cryptography. IEEE Transactions on Dependable and Secure Computing, 17(5), 1124–1132.CrossRef He, D., Zhang, Y., Wang, D., & Choo, K. K. R. (2020). Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE p1363 standard for public key cryptography. IEEE Transactions on Dependable and Secure Computing, 17(5), 1124–1132.CrossRef
7.
Zurück zum Zitat Feng, Q., He, D., Liu, Z., Wang, D., & Choo, K. K. R. (2020). Distributed signing protocol for IEEE p1363-compliant identity-based signature scheme. IET Information Security, 14(4), 443–451.CrossRef Feng, Q., He, D., Liu, Z., Wang, D., & Choo, K. K. R. (2020). Distributed signing protocol for IEEE p1363-compliant identity-based signature scheme. IET Information Security, 14(4), 443–451.CrossRef
8.
Zurück zum Zitat Liang, W., Long, J., Li, K. C., Xu, J., Ma, N., & Lei, X. (2021). A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Transactions on Multimedia Computing Communications Application17(2), 1–6. Liang, W., Long, J., Li, K. C., Xu, J., Ma, N., & Lei, X. (2021). A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Transactions on Multimedia Computing Communications Application17(2), 1–6.
9.
Zurück zum Zitat Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43.CrossRef Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43.CrossRef
10.
Zurück zum Zitat Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys and Tutorials, 21(4), 3682–3722.CrossRef Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys and Tutorials, 21(4), 3682–3722.CrossRef
11.
Zurück zum Zitat Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., et al. (2020). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys and Tutorials, 22(1), 170–195.CrossRef Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., et al. (2020). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys and Tutorials, 22(1), 170–195.CrossRef
12.
Zurück zum Zitat Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements and future directions. IEEE Communications Surveys and Tutorials, 22(1), 196–248.CrossRef Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements and future directions. IEEE Communications Surveys and Tutorials, 22(1), 196–248.CrossRef
13.
Zurück zum Zitat 3GPP. (2018). Security architecture and procedures for 5G system, TS 133 501, V15.1.0. 3GPP. (2018). Security architecture and procedures for 5G system, TS 133 501, V15.1.0.
14.
Zurück zum Zitat Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., & Stettler, V. (2018) A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1383–1396). Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., & Stettler, V. (2018) A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1383–1396).
15.
Zurück zum Zitat Shin, S., & Kwon, T. (2018) .Two-factor authenticated key agreement supporting unlinkability in 5g-integrated wireless sensor networks. IEEE Access, 6, 11229–11241. Shin, S., & Kwon, T. (2018) .Two-factor authenticated key agreement supporting unlinkability in 5g-integrated wireless sensor networks. IEEE Access, 6, 11229–11241.
16.
Zurück zum Zitat Borgaonkar, R., Hirschi, L., Park, S., & Shaik, A. (2019). New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proceedings on Privacy Enhancing Technologies, 3, 108–127.CrossRef Borgaonkar, R., Hirschi, L., Park, S., & Shaik, A. (2019). New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proceedings on Privacy Enhancing Technologies, 3, 108–127.CrossRef
17.
Zurück zum Zitat Koutsos, A. (2019). The 5G-AKA authentication protocol privacy. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 464–479). IEEE. Koutsos, A. (2019). The 5G-AKA authentication protocol privacy. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 464–479). IEEE.
18.
Zurück zum Zitat Jover, R. P., & Marojevic, V. (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access, 7, 24956–24963. Jover, R. P., & Marojevic, V. (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access, 7, 24956–24963.
19.
Zurück zum Zitat Cremers, C., & Dehnel-Wild, M. (2019) Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24–27. The Internet Society. Cremers, C., & Dehnel-Wild, M. (2019) Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24–27. The Internet Society.
20.
Zurück zum Zitat Braeken, A., Liyanage, M., Kumar, P., & Murphy, J. (2019). Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access, 7, 64040–64052. Braeken, A., Liyanage, M., Kumar, P., & Murphy, J. (2019). Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access, 7, 64040–64052.
21.
Zurück zum Zitat Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2018). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690–3700. Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2018). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690–3700.
22.
Zurück zum Zitat Liu, Q., Hou, P., Wang, G., Peng, T., & Zhang, S. (2019). Intelligent route planning on large road networks with efficiency and privacy. Jounal on Parallel Distributed Computing, 133, 93–106.CrossRef Liu, Q., Hou, P., Wang, G., Peng, T., & Zhang, S. (2019). Intelligent route planning on large road networks with efficiency and privacy. Jounal on Parallel Distributed Computing, 133, 93–106.CrossRef
23.
Zurück zum Zitat Hojjati, M., Shafieinejad, A., & Yanikomeroglu, H. (2020). A blockchain-based authentication and key agreement (AKA) protocol for 5g networks. IEEE Access, 8, 216461–216476. Hojjati, M., Shafieinejad, A., & Yanikomeroglu, H. (2020). A blockchain-based authentication and key agreement (AKA) protocol for 5g networks. IEEE Access, 8, 216461–216476.
24.
Zurück zum Zitat Gharsallah, I., Smaoui, S., & Zarai, F. (2020). An efficient authentication and key agreement protocol for a group of vehicles devices in 5g cellular networks. IET Information Security, 14(1), 21–29.CrossRef Gharsallah, I., Smaoui, S., & Zarai, F. (2020). An efficient authentication and key agreement protocol for a group of vehicles devices in 5g cellular networks. IET Information Security, 14(1), 21–29.CrossRef
25.
Zurück zum Zitat Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., & Wang, G. (2020) Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Transactions on Services Computing. Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., & Wang, G. (2020) Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Transactions on Services Computing.
26.
Zurück zum Zitat Liu, Q., Peng, Y., Wu, J., Wang, T., & Wang, G. (2020). Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management. Liu, Q., Peng, Y., Wu, J., Wang, T., & Wang, G. (2020). Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management.
27.
Zurück zum Zitat Li, Z., Li, W., Lin, F., Sun, Y., Yang, M., Zhang, Y., & Wang, Z. (2020). Hybrid malware detection approach with feedback-directed machine learning. Science China Information Sciences63(3), 139103. Li, Z., Li, W., Lin, F., Sun, Y., Yang, M., Zhang, Y., & Wang, Z. (2020). Hybrid malware detection approach with feedback-directed machine learning. Science China Information Sciences63(3), 139103.
28.
Zurück zum Zitat Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5g wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021–7032.CrossRef Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5g wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021–7032.CrossRef
29.
Zurück zum Zitat Sriraam, SV., Sajeev, S., Joshi, R., Vithalkar, A., Bansal, M., & Jagadeesh, H. (2020). Implementation of 5g authentication and key agreement protocol on xbee networks. In 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Bengaluru, India, January 7–11. IEEE, pp. 696–698. Sriraam, SV., Sajeev, S., Joshi, R., Vithalkar, A., Bansal, M., & Jagadeesh, H. (2020). Implementation of 5g authentication and key agreement protocol on xbee networks. In 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Bengaluru, India, January 7–11. IEEE, pp. 696–698.
30.
Zurück zum Zitat Adavoudi-Jolfaei, A., Ashouri-Talouki, M., & Aghili, S. F. (2019). Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Network Applications, 12(1), 43–59.CrossRef Adavoudi-Jolfaei, A., Ashouri-Talouki, M., & Aghili, S. F. (2019). Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Network Applications, 12(1), 43–59.CrossRef
31.
Zurück zum Zitat Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access, 8, 67555–67571. Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access, 8, 67555–67571.
32.
Zurück zum Zitat Han, K., Ma, M., Li, X., Feng, Z., & Hao, J. (2019). An efficient handover authentication mechanism for 5g wireless network. In 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15–18, 2019. IEEE, pp. 1–8. Han, K., Ma, M., Li, X., Feng, Z., & Hao, J. (2019). An efficient handover authentication mechanism for 5g wireless network. In 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15–18, 2019. IEEE, pp. 1–8.
33.
Zurück zum Zitat Blanchet, B., Abadi, M., & Fournet, C. (2008). Automated verification of selected equivalences for security protocols. Journal of Logical and Algebraic Methods Program, 75(1), 3–51.CrossRef Blanchet, B., Abadi, M., & Fournet, C. (2008). Automated verification of selected equivalences for security protocols. Journal of Logical and Algebraic Methods Program, 75(1), 3–51.CrossRef
Metadaten
Titel
A new authentication and key agreement protocol for 5G wireless networks
verfasst von
Tian Liu
Fan Wu
Xiong Li
Chaoyang Chen
Publikationsdatum
29.07.2021
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2021
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00815-9

Weitere Artikel der Ausgabe 3/2021

Telecommunication Systems 3/2021 Zur Ausgabe

Neuer Inhalt