Skip to main content
Top
Published in: The Journal of Supercomputing 4/2023

15-09-2022

Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

Authors: Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty

Published in: The Journal of Supercomputing | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we have proposed a lightweight mutual authentication and key agreement scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed 5GMAKA protocol has been implemented to overcome the problem associated with the 5G authentication and key agreement (5G AKA) protocol suggested by the 3rd generation partnership project (3GPP). 5G AKA is exposed to various sorts of fatal network security attacks and takes excessive time to execute (\(\sim ~685.62\,{\rm milliseconds}\)) compared to other related authentication and key agreement schemes as per the literature survey. The stability and robustness of the proposed 5GMAKA under safety issues are ensured by the results obtained from the security analysis of the scheme using the well-known rubin logic and automatic validation of internet security protocol applications (AVISPA) simulation tool. The performance analysis of the proposed 5GMAKA shows that this scheme is superior compared to 5G AKA of 3GPP and other standard protocols with respect to enhanced security features, five communication rounds, and shorter execution time (\(\sim 0.72\,{\rm milliseconds}\)) which is the lowest among all other related schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151 Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151
8.
go back to reference Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://doi.org/10.1145/2382196.2382221 Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://​doi.​org/​10.​1145/​2382196.​2382221
9.
go back to reference Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275 Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275
10.
go back to reference Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_56 Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-07782-6_​56
15.
go back to reference Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220CrossRef Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220CrossRef
16.
go back to reference Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296CrossRef Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296CrossRef
17.
go back to reference Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef
18.
go back to reference Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef
19.
go back to reference Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef
20.
go back to reference Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110 Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
21.
go back to reference Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef
22.
go back to reference Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126) Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126)
23.
go back to reference Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef
24.
go back to reference Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef
25.
go back to reference Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://doi.org/10.1007/978-981-15-0361-0_14 Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://​doi.​org/​10.​1007/​978-981-15-0361-0_​14
26.
31.
go back to reference Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127CrossRef Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127CrossRef
33.
go back to reference Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://doi.org/10.1145/3243734.3243846 Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://​doi.​org/​10.​1145/​3243734.​3243846
42.
go back to reference Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56 Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56
43.
go back to reference Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031CrossRef Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031CrossRef
47.
go back to reference Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208CrossRefMATH Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208CrossRefMATH
48.
go back to reference Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116CrossRef Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116CrossRef
50.
go back to reference Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17 Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17
Metadata
Title
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network
Authors
Sudip Kumar Palit
Mohuya Chakraborty
Subhalaxmi Chakraborty
Publication date
15-09-2022
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 4/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-04807-7

Other articles of this Issue 4/2023

The Journal of Supercomputing 4/2023 Go to the issue

Premium Partner