Skip to main content
Top
Published in: Telecommunication Systems 3/2021

29-07-2021

A new authentication and key agreement protocol for 5G wireless networks

Authors: Tian Liu, Fan Wu, Xiong Li, Chaoyang Chen

Published in: Telecommunication Systems | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP group has standardized the AKA protocol for 5G mobile communication systems. Even though 5G AKA protocol has improved security compared with 3G and 4G AKA protocols, several studies have shown that some critical goals are still not fulfilled, such as violation of untracebility and lack of session key confirmation. In this article, we propose a security enhanced AKA protocol for 5G to overcome the previous identified weaknesses. In our protocol, random number based challenge-response mechanism is used to resist replay attacks, which also saves the communication cost since our protocol has no sequence number de-synchronization problem. Besides, our protocol guarantees the feature of session key confirmation, which allows the subscriber and serving network confirm that they share a session key after successful authentication. Through the formal verification of Proverif, the security of our proposed protocol is proved. Moreover, elliptic-curve Diffie–Hellman mechanism is adopted by our protocol, and therefore the property of perfect forward secrecy can be achieved.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Physical Communication, 18, 64–84.CrossRef Panwar, N., Sharma, S., & Singh, A. K. (2016). A survey on 5G: The next generation of mobile communication. Physical Communication, 18, 64–84.CrossRef
2.
go back to reference Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues, J. J. (2019). Fog computing for smart grid systems in the 5G environment: Challenges and solutions. IEEE Wireless Communications, 26(3), 47–53.CrossRef Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., & Rodrigues, J. J. (2019). Fog computing for smart grid systems in the 5G environment: Challenges and solutions. IEEE Wireless Communications, 26(3), 47–53.CrossRef
3.
go back to reference Lu, R., Zhang, L., Ni, J., & Fang, Y. (2020). 5G vehicle-to-everything services: Gearing up for security and privacy. Proceedings of the IEEE, 108(2), 373–389.CrossRef Lu, R., Zhang, L., Ni, J., & Fang, Y. (2020). 5G vehicle-to-everything services: Gearing up for security and privacy. Proceedings of the IEEE, 108(2), 373–389.CrossRef
4.
go back to reference Lai, C., Lu, R., Zheng, D., & Shen, X. S. (2020). Security and privacy challenges in 5G-enabled vehicular networks. IEEE Network, 34(2), 37–45.CrossRef Lai, C., Lu, R., Zheng, D., & Shen, X. S. (2020). Security and privacy challenges in 5G-enabled vehicular networks. IEEE Network, 34(2), 37–45.CrossRef
5.
go back to reference He, D., Zhang, Y., Wang, D., & Choo, K. K. R. (2020). Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE p1363 standard for public key cryptography. IEEE Transactions on Dependable and Secure Computing, 17(5), 1124–1132.CrossRef He, D., Zhang, Y., Wang, D., & Choo, K. K. R. (2020). Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE p1363 standard for public key cryptography. IEEE Transactions on Dependable and Secure Computing, 17(5), 1124–1132.CrossRef
7.
go back to reference Feng, Q., He, D., Liu, Z., Wang, D., & Choo, K. K. R. (2020). Distributed signing protocol for IEEE p1363-compliant identity-based signature scheme. IET Information Security, 14(4), 443–451.CrossRef Feng, Q., He, D., Liu, Z., Wang, D., & Choo, K. K. R. (2020). Distributed signing protocol for IEEE p1363-compliant identity-based signature scheme. IET Information Security, 14(4), 443–451.CrossRef
8.
go back to reference Liang, W., Long, J., Li, K. C., Xu, J., Ma, N., & Lei, X. (2021). A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Transactions on Multimedia Computing Communications Application17(2), 1–6. Liang, W., Long, J., Li, K. C., Xu, J., Ma, N., & Lei, X. (2021). A fast defogging image recognition algorithm based on bilateral hybrid filtering. ACM Transactions on Multimedia Computing Communications Application17(2), 1–6.
9.
go back to reference Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43.CrossRef Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2018). Overview of 5G security challenges and solutions. IEEE Communications Standards Magazine, 2(1), 36–43.CrossRef
10.
go back to reference Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys and Tutorials, 21(4), 3682–3722.CrossRef Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., & Ylianttila, M. (2019). Security for 5G and beyond. IEEE Communications Surveys and Tutorials, 21(4), 3682–3722.CrossRef
11.
go back to reference Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., et al. (2020). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys and Tutorials, 22(1), 170–195.CrossRef Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., et al. (2020). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys and Tutorials, 22(1), 170–195.CrossRef
12.
go back to reference Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements and future directions. IEEE Communications Surveys and Tutorials, 22(1), 196–248.CrossRef Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements and future directions. IEEE Communications Surveys and Tutorials, 22(1), 196–248.CrossRef
13.
go back to reference 3GPP. (2018). Security architecture and procedures for 5G system, TS 133 501, V15.1.0. 3GPP. (2018). Security architecture and procedures for 5G system, TS 133 501, V15.1.0.
14.
go back to reference Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., & Stettler, V. (2018) A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1383–1396). Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., & Stettler, V. (2018) A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1383–1396).
15.
go back to reference Shin, S., & Kwon, T. (2018) .Two-factor authenticated key agreement supporting unlinkability in 5g-integrated wireless sensor networks. IEEE Access, 6, 11229–11241. Shin, S., & Kwon, T. (2018) .Two-factor authenticated key agreement supporting unlinkability in 5g-integrated wireless sensor networks. IEEE Access, 6, 11229–11241.
16.
go back to reference Borgaonkar, R., Hirschi, L., Park, S., & Shaik, A. (2019). New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proceedings on Privacy Enhancing Technologies, 3, 108–127.CrossRef Borgaonkar, R., Hirschi, L., Park, S., & Shaik, A. (2019). New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proceedings on Privacy Enhancing Technologies, 3, 108–127.CrossRef
17.
go back to reference Koutsos, A. (2019). The 5G-AKA authentication protocol privacy. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 464–479). IEEE. Koutsos, A. (2019). The 5G-AKA authentication protocol privacy. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 464–479). IEEE.
18.
go back to reference Jover, R. P., & Marojevic, V. (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access, 7, 24956–24963. Jover, R. P., & Marojevic, V. (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access, 7, 24956–24963.
19.
go back to reference Cremers, C., & Dehnel-Wild, M. (2019) Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24–27. The Internet Society. Cremers, C., & Dehnel-Wild, M. (2019) Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24–27. The Internet Society.
20.
go back to reference Braeken, A., Liyanage, M., Kumar, P., & Murphy, J. (2019). Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access, 7, 64040–64052. Braeken, A., Liyanage, M., Kumar, P., & Murphy, J. (2019). Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access, 7, 64040–64052.
21.
go back to reference Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2018). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690–3700. Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2018). Consortium blockchain for secure energy trading in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3690–3700.
22.
go back to reference Liu, Q., Hou, P., Wang, G., Peng, T., & Zhang, S. (2019). Intelligent route planning on large road networks with efficiency and privacy. Jounal on Parallel Distributed Computing, 133, 93–106.CrossRef Liu, Q., Hou, P., Wang, G., Peng, T., & Zhang, S. (2019). Intelligent route planning on large road networks with efficiency and privacy. Jounal on Parallel Distributed Computing, 133, 93–106.CrossRef
23.
go back to reference Hojjati, M., Shafieinejad, A., & Yanikomeroglu, H. (2020). A blockchain-based authentication and key agreement (AKA) protocol for 5g networks. IEEE Access, 8, 216461–216476. Hojjati, M., Shafieinejad, A., & Yanikomeroglu, H. (2020). A blockchain-based authentication and key agreement (AKA) protocol for 5g networks. IEEE Access, 8, 216461–216476.
24.
go back to reference Gharsallah, I., Smaoui, S., & Zarai, F. (2020). An efficient authentication and key agreement protocol for a group of vehicles devices in 5g cellular networks. IET Information Security, 14(1), 21–29.CrossRef Gharsallah, I., Smaoui, S., & Zarai, F. (2020). An efficient authentication and key agreement protocol for a group of vehicles devices in 5g cellular networks. IET Information Security, 14(1), 21–29.CrossRef
25.
go back to reference Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., & Wang, G. (2020) Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Transactions on Services Computing. Liu, Q., Peng, Y., Pei, S., Wu, J., Peng, T., & Wang, G. (2020) Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search. IEEE Transactions on Services Computing.
26.
go back to reference Liu, Q., Peng, Y., Wu, J., Wang, T., & Wang, G. (2020). Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management. Liu, Q., Peng, Y., Wu, J., Wang, T., & Wang, G. (2020). Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Transactions on Network and Service Management.
27.
go back to reference Li, Z., Li, W., Lin, F., Sun, Y., Yang, M., Zhang, Y., & Wang, Z. (2020). Hybrid malware detection approach with feedback-directed machine learning. Science China Information Sciences63(3), 139103. Li, Z., Li, W., Lin, F., Sun, Y., Yang, M., Zhang, Y., & Wang, Z. (2020). Hybrid malware detection approach with feedback-directed machine learning. Science China Information Sciences63(3), 139103.
28.
go back to reference Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5g wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021–7032.CrossRef Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5g wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021–7032.CrossRef
29.
go back to reference Sriraam, SV., Sajeev, S., Joshi, R., Vithalkar, A., Bansal, M., & Jagadeesh, H. (2020). Implementation of 5g authentication and key agreement protocol on xbee networks. In 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Bengaluru, India, January 7–11. IEEE, pp. 696–698. Sriraam, SV., Sajeev, S., Joshi, R., Vithalkar, A., Bansal, M., & Jagadeesh, H. (2020). Implementation of 5g authentication and key agreement protocol on xbee networks. In 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Bengaluru, India, January 7–11. IEEE, pp. 696–698.
30.
go back to reference Adavoudi-Jolfaei, A., Ashouri-Talouki, M., & Aghili, S. F. (2019). Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Network Applications, 12(1), 43–59.CrossRef Adavoudi-Jolfaei, A., Ashouri-Talouki, M., & Aghili, S. F. (2019). Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Network Applications, 12(1), 43–59.CrossRef
31.
go back to reference Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access, 8, 67555–67571. Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access, 8, 67555–67571.
32.
go back to reference Han, K., Ma, M., Li, X., Feng, Z., & Hao, J. (2019). An efficient handover authentication mechanism for 5g wireless network. In 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15–18, 2019. IEEE, pp. 1–8. Han, K., Ma, M., Li, X., Feng, Z., & Hao, J. (2019). An efficient handover authentication mechanism for 5g wireless network. In 2019 IEEE Wireless Communications and Networking Conference, WCNC 2019, Marrakesh, Morocco, April 15–18, 2019. IEEE, pp. 1–8.
33.
go back to reference Blanchet, B., Abadi, M., & Fournet, C. (2008). Automated verification of selected equivalences for security protocols. Journal of Logical and Algebraic Methods Program, 75(1), 3–51.CrossRef Blanchet, B., Abadi, M., & Fournet, C. (2008). Automated verification of selected equivalences for security protocols. Journal of Logical and Algebraic Methods Program, 75(1), 3–51.CrossRef
Metadata
Title
A new authentication and key agreement protocol for 5G wireless networks
Authors
Tian Liu
Fan Wu
Xiong Li
Chaoyang Chen
Publication date
29-07-2021
Publisher
Springer US
Published in
Telecommunication Systems / Issue 3/2021
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00815-9

Other articles of this Issue 3/2021

Telecommunication Systems 3/2021 Go to the issue