Next Article in Journal
Human Joint Torque Estimation Based on Mechanomyography for Upper Extremity Exosuit
Next Article in Special Issue
Network Slicing for mMTC and URLLC Using Software-Defined Networking with P4 Switches
Previous Article in Journal
Attack Graph Generation with Machine Learning for Network Security
Previous Article in Special Issue
A Model for the Definition, Prioritization and Optimization of Indicators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

1
School of Modern Posts, Xi’an University of Post and Telecommunications, Xi’an 710061, China
2
Shaanxi Provincial Information Engineering Research Institute, Xi’an 710121, China
3
School of Computer, Xi’an University of Post and Telecommunications, Xi’an 710061, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(9), 1333; https://doi.org/10.3390/electronics11091333
Submission received: 6 February 2022 / Revised: 1 April 2022 / Accepted: 14 April 2022 / Published: 22 April 2022
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)

Abstract

:
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA’. In the 5G-AKA’ protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge–response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA’ protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA’ protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA’ protocol is efficient and is backward compatible with the 5G AKA protocol.

1. Introduction

With the continuous popularization of the 5th generation mobile communication technology (5G), in the near future, the 5G network, as an important communication infrastructure, will penetrate into diversified vertical industries and fields such as transportation, medical treatment and industry, and support various information interactions between people, people and things, and things and things [1]. In the 5G network, three different primary authentication and key agreement protocols are defined in the related 3rd generation partnership project (3GPP) specifications [2,3,4], including the 5G authentication and key agreement (AKA) protocol, the improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’) protocol and the 5G extensible authentication protocol method for transport layer security (EAP-TLS) protocol. The first two protocols are based on the shared key cryptography, while the last one is based on the public key cryptography. These protocols all aim to provide mutual authentication of subscribers and networks. Currently, they are in the process of standardization.
The 5G AKA protocol [2,3,4] is developed directly from the evolution packet system (EPS)-AKA protocol of the long-term evolution (LTE)/4th generation mobile communication technology (4G) network [3], so it inherits certain security vulnerabilities from the EPS-AKA protocol such as impersonation attacks, man-in-the-middle attacks (MitM) and denial of service (DoS) attacks [5,6,7,8,9,10,11]. Dehnel-Wild et al. [12] analyzed the 5G AKA protocol of technical specification (TS) 33.501 v0.7.0. They discovered a protocol vulnerability that would enable the attacker to impersonate another user to a serving network (SN). Based on the Tamarin model checker [13], Basin et al. [14] investigated the security properties of the 5G AKA protocol of TS 33.501 v15.1.0, and several major issues were revealed, which are related to user localization, leakage of activity, the impact of active attackers and the presence of malicious SN while roaming. In [15], Liu et al. pointed out that the 5G AKA protocol suffers from link-ability attacks, and then proposed a new authentication scheme by making use of the Diffie–Hellman key exchange algorithm for generating the session key. This scheme was successful in preventing link-ability attacks along with a MitM attack.
For the more recent 5G AKA protocol, Borgaonkar et al. [16] found a new attack. They claimed that the protection mechanism of the sequence number (SQN) can be defeated under specific replay attacks due to its use of exclusive-or (XOR) and a lack of randomness. In [17], Cremers et al. modeled all the key components of the 5G AKA protocol (i.e., the user equipment, the serving network and the home network) according to the definition in the 3GPP specification document. They discovered an attack that exploits a potential race condition and additionally showed that solving the race condition for the honest case does not necessarily prevent the attack. In [18], Koutsos et al. investigated the privacy properties of the 5G AKA protocol using the Bana–Comon logic [19,20]. They discovered a novel de-synchronization attack and proved that their proposed protocol guarantees the privacy properties. In [21], Braeken et al. proposed a novel version of the 5G AKA protocol to prevent active attacks and gain resistance against malignant serving networks. Unfortunately, there is a possibility of having SN impersonation, so this scheme does not eliminate the vulnerability towards the MitM attack. Further, Gharsallah et al. [22] also attempted to launch a revised version of the 5G AKA protocol. However, their proposed protocol suffers from privacy preservation as the device identities are clearly transmitted in the air which leads to numerous security attacks.
As time goes on, more and more attacks of the 5G AKA protocol were found due to the insecure channel between different network domains in the legacy mobile network. In [23], Hu et al. discovered an attack exploiting the subscription concealed identifier (SUCI) to track a subscriber in the 5G network, which is directly caused by the insecure air channel. To cover this issue, they proposed a secure authentication scheme by utilizing the existing public key infrastructure (PKI) mechanism. Further, they found a location sniffing attack, which can be implemented by an attacker through inexpensive devices [24]. Similarly, they proposed a fix scheme based on the existing PKI mechanism. In [25], Edris et al. modeled the 5G AKA protocol with symbolic modeling using ProVerif based on three and four entities models, and then proposed their security consideration. Further, Mariya et al. [26] proposed an enhanced version of the authentication and key agreement protocol for the 5G system that surmounts the limitations existing in the 5G AKA protocol. Parne et al. [27] introduced a protocol that preserves the privacy of the user identity and overcomes the identified problems of the 5G AKA protocol. Similarly, 3GPP has also been enhancing the security of the 5G AKA protocol [2,3,4].
Because the 5G AKA protocol [2,3,4] introduces synchronization failure and message authentication code (MAC) failure procedures, it has three cases, so there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the above security analysis and improvement of the 5G AKA protocol. Therefore, we formally analyze the security of the latest version of the 5G AKA protocol considering three cases at the same time. Then, we propose a secure and efficient primary authentication and key agreement protocol for 5G networks, named the 5G-AKA’. Finally, we prove that the 5G-AKA’ protocol is secure, and it is efficient and backward compatible.
The main contributions of this paper are as follows:
  • We formally analyze the security of the latest version of the 5G AKA protocol in the mixed strand space model for mixed protocols [28] and give twenty-one attack scenarios of the 5G AKA protocol. Based on these attack scenarios, we find many new attacks of the 5G AKA protocol, including cross attacks for mixed cases.
  • We propose the 5G-AKA’ protocol, and then formally analyze its security in the mixed strand space model for mixed protocols [28]. As a result, no attack scenario is obtained. By discussion and analysis, the 5G-AKA’ protocol can overcome these attacks of the 5G AKA protocol, thus it is secure.
  • Based on comparative analysis, the 5G-AKA’ protocol is better than the 5G AKA protocol and the recently improved 5G AKA protocols in security, and is efficient and backward compatible.
The rest of this paper is organized as follows. Section 2 provides an overview of the latest version of the 5G AKA protocol. In Section 3, we formally analyze the security of the latest version of the 5G AKA protocol in the mixed strand space model. Section 4 describes our proposed 5G-AKA’ protocol and gives the security analysis of the 5G-AKA’ protocol in the mixed strand space model. In Section 5, we present some discussions and we conclude the paper in Section 6.

2. Overview of the 5G AKA Protocol

According to [2,3,4], the steps of the latest version of the 5G AKA protocol in the 3GPP standard version v17.4.0 of TS 33.501 are illustrated in Figure 1.
In Figure 1, the detailed steps of the latest version of the 5G AKA protocol are as follows:
  • When the security anchor function (SEAF) initiates authentication with the user equipment (UE), the UE sends S U C I to the SEAF, where the UE includes mobile equipment (ME) and a universal subscriber identity module (USIM).
    S U C I = x G | | { S U P I } E K | | M A C U E
    E K | | I C B | | M K = K D F ( x y G )
    M A C U E = H M A C ( M K , { S U P I } E K )
    where S U C I denotes a SUCI of the UE, S U P I denotes the subscription permanent identifier (SUPI) of the UE, x G and x are an ephemeral public/private key pair of the UE for the Diffie–Hellman exchange, y G and y are an ephemeral public/private key pair of the home network (HN) for the Diffie–Hellman exchange, E K is an encryption key, I C B is an initial counter block (ICB), M K is a MAC key, M A C U E is a MAC of the UE, K D F ( ) is a key derivation function and H M A C ( ) is a hash function for computing MAC, | | denotes a cascade of fields.
  • Upon receiving S U C I , the SEAF sends S U C I and S N N to the authentication server function (AUSF). S N N denotes the serving network name (SNN) of the SN.
  • If the SEAF is entitled to use S N N , then the AUSF stores the receiving S N N and sends S U C I and S N N to the unified data management (UDM).
  • The UDM invokes the subscriber identity de-concealing function (SIDF) whether S U C I is received. Then, the SIDF de-conceals S U C I to gain S U P I before the UDM can process the request. Based on S U P I , the UDM/ARPF (authentication credential repository and processing function) chooses the authentication method.
  • When 5G AKA is selected, the UDM/ARPF generates R A N D , calculates A U T N and X R E S * , and derives K A U S F , and then creates a 5G home environment authentication vector from R A N D , A U T N , X R E S * and K A U S F . R A N D is an unpredictable challenge of the HN.
    A U T N = S Q N A K | | A M F | | M A C
    M A C = f 1 ( K , S Q N | | R A N D | | A M F )
    X R E S = f 2 ( K , R A N D )
    C K = f 3 ( K , R A N D )
    I K = f 4 ( K , R A N D )
    A K = f 5 ( K , R A N D )
    K A U S F = K D F ( C K | | I K , S N N | | S Q N A K )
    X R E S * = K D F ( C K | | I K , S N N | | R A N D | | X R E S )
    where A U T N is an authentication token of the HN, S Q N is a fresh sequence number generated by the HN, A K is an anonymity key, A M F is the authentication management field (AMF) and the separation bit of the AMF is set 1, M A C is a MAC of the HN, K is a long-term key between the UE and the HN, f 1 ( ) and f 2 ( ) are two message authentication functions, f 3 ( ) , f 4 ( ) and f 5 ( ) is three key generating functions, C K is a cipher key, I K is an integrity key, K A U S F is a key derived from C K and I K , X R E S is an expected response and X R E S * is an expected response derived from C K and I K .
  • The UDM sends the 5G home environment authentication vector to the AUSF together with S U P I . When an authentication and key management for applications (AKMA) subscription is used, the UDM also sends A K M A to the AUSF. A K M A denotes the AKMA indication and routing indicator.
  • The AUSF stores the X R E S * temporarily together with the received S U P I .
  • The AUSF generates a 5G authentication vector from the 5G home environment authentication vector received from the UDM/ARPF by computing H X R E S * from X R E S * , computing K S E A F from K A U S F , replacing X R E S * with H X R E S * , and replacing K A U S F with K S E A F in the 5G home environment authentication vector.
    H X R E S * = S H A 256 ( R A N D | | X R E S * )
    K S E A F = K D F ( K A U S F , S N N )
    where H X R E S * is a hashing X R E S * , S H A 256 ( ) is a hash function.
  • The ASUF creates a 5G serving environment authentication vector by removing K S E A F from the 5G authentication vector, and then sends the 5G serving environment authentication vector (i.e., R A N D , A U T N and H X R E S * ) to the SEAF.
  • The SEAF stores H X R E S * , and then sends R A N D , A U T N , n g K S I and A B B A to the UE. n g K S I is used by the UE and the access and mobility management function to identify the K A M F and the partial native security context that is created if the authentication is successful. A B B A denotes the anti-bidding down between architectures (ABBA) parameter.
  • In the UE, the ME forwards R A N D and A U T N to the USIM. Upon receipt of R A N D and A U T N , the USIM first computes the anonymity key A K and retrieves the sequence number S Q N . Next, the USIM computes X M A C and compares this with M A C which is included in A U T N . Then, the USIM verifies that the received S Q N is in the correct range. If X M A C is the same as M A C and S Q N is in the correct range (i.e., S Q N U E < S Q N , where S Q N U E denotes the highest sequence number the USIM has accepted), then the USIM computes a response R E S , C K and I K , and then returns R E S , C K and I K to the ME. The ME then computes R E S * , K A U S F and K S E A F .
    X M A C = f 1 ( K , S Q N | | R A N D | | A M F )
    R E S = f 2 ( K , R A N D )
    R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S )
    where R E S is a response and R E S * is a response derived from C K and I K .
  • The UE sends R E S * to the SEAF.
  • The SEAF computes H R E S * and compares this with H X R E S * . If they coincide, then the SEAF considers the authentication as successful from the serving network’s point of view. If not, then the SEAF considers the authentication as unsuccessful.
    H R E S * = S H A 256 ( R A N D | | R E S * )
    where H R E S * is a hashing R E S * .
  • The SEAF sends the received R E S * to the AUSF.
  • The AUSF compares the received R E S * with the stored X R E S * . If R E S * and X R E S * are equal, then the AUSF considers the authentication as successful from the home network point of view. Then, the AUSF informs the UDM about the authentication result.
  • The AUSF indicates to the SEAF whether the authentication was successful or not from the home network point of view (i.e., R e s u l t ). If the authentication was successful, then the ASUF also sends K S E A F and S U P I to the SEAF.
In step 11, if X M A C and M A C are different, then the USIM indicates to the ME a MAC failure of A U T N . Then, the UE sends the “MAC failure” indication to the SEAF. Further, the SEAF sends the “MAC failure” indication to the AUSF. Finally, the ASUF sends the “MAC failure” indication to the UDM/ARPF.
In step 11, if S Q N is not in the correct range (i.e., S Q N U E S Q N ), then the USIM computes A U T S , and then sends A U T S with a “Synchronization failure” indication to the ME. Then, the UE sends A U T S with the “Synchronization failure” indication to the SEAF. Further, the SEAF sends R A N D and A U T S with the “Synchronization failure” indication to the AUSF. Finally, the ASUF sends R A N D and A U T S with the “Synchronization failure” indication to the UDM/ARPF.
A U T S = S Q N U E A K | | M A C S
M A C S = f 1 ( K , S Q N U E | | R A N D | | A M F 0 )
A K = f 5 ( K , R A N D )
where A K is an anonymity key, M A C S is a MAC of the UE, A M F 0 is a dummy value of all zeros, f 1 ( ) is a message authentication function and f 5 ( ) is a key generating function.
Upon receiving the “MAC failure” indication or the “Synchronization failure” indication, the UDM/ARPF creates a new 5G home environment authentication vector and runs a new authentication procedure with the UE, i.e., go to step 5 to continue the 5G AKA protocol. Under normal communication conditions, these failures do not often occur [2,3,4]. However, they can often be used by the penetrator to perform many attacks on the 5G AKA protocol (see Section 3). In [14,15,18,24], the authors also exploited the usage of the different types of failures, MAC-based or synchronization-based, to track a specific subscriber, and then given the corresponding revised schemes.

3. Formal Verification and Analysis of the 5G AKA Protocol

To simplify the formal verification and analysis, we assume that:
  • The parties of the 5G AKA protocol shown in Figure 1 are simplified as the UE, the SN and the HN. The USIM and the ME are located in the UE, and the SEAF is located in the SN. The AUSF, the UDM, the ARPE and the SIDF are located in the HN.
  • There is a session key between the SN and the HN, and it is secure.
  • n g K S I and A B B A do not affect the security of the 5G AKA protocol, so they are ignored here.
According to these assumptions, the 5G AKA protocol shown in Figure 1 can be summarized into three cases as follows:
Case (I): the verification of A U T N succeeds and the authentication is successful. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D | | A U T N ;
  • U E S N : R E S * ;
  • S N H N : { R E S * } K S N , H N ;
  • H N S N : { R e s u l t | | K S E A F | | S U P I } K S N , H N .
where S U C I , R A N D | | A U T N and R E S * are three messages exchanged between the UE and SN, { S U C I | | S N N } K S N , H N , { R A N D | | A U T N | | H X R E S * } K S N , H N , { R E S * } K S N , H N and { R e s u l t | | K S E A F | | S U P I } K S N , H N are four messages exchanged between the SN and the HN.
Case (II): the verification of A U T N fails and it is a synchronization failure. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D | | A U T N ;
  • U E S N : S y n c f | | A U T S ;
  • S N H N : { S y n c f | | R A N D | | A U T S } K S N , H N .
where S U C I , R A N D | | A U T N and S y n c f | | A U T S are three messages exchanged between the UE and SN, { S U C I | | S N N } K S N , H N , { R A N D | | A U T N | | H X R E S * } K S N , H N and { S y n c f | | R A N D | | A U T S } K S N , H N are three messages exchanged between the SN and the HN.
Case (III): the verification of A U T N fails and it is a MAC failure. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D | | A U T N ;
  • U E S N : M A C f ;
  • S N H N : { M A C f } K S N , H N .
where S U C I , R A N D | | A U T N and M A C f are three messages exchanged between the UE and SN, { S U C I | | S N N } K S N , H N , { R A N D | | A U T N | | H X R E S * } K S N , H N and { M A C f } K S N , H N are three messages exchanged between the SN and the HN.
In the above cases, K S N , H N denotes the session key between the SN and the HN, S y n c f denotes the “Synchronization failure” indication and M A C f denotes the “MAC failure” indication.
The strand space model [28,29,30] is a well-studied formal analysis method for security protocols. In [28], Fábrega et al. studied the case of mixed protocols, where principals use secret material in more than one protocol. In such cases, the two protocols can potentially interact, forming vulnerabilities not present in either protocol alone. To find these vulnerabilities, they proposed a mixed strand space model for such cases.
As mentioned above, there are three cases in the 5G AKA protocol, so there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. In order to find these vulnerabilities, we use the mixed strand space model [28] to analyze the security of the 5G AKA protocol as follows.

3.1. Mixed Strand Space for the 5G AKA Protocol

Definition 1.
A regular strand space I is a space for case I of the 5G AKA protocol if I is the union of three kinds of strands: (1) Initiator strands s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] with trace: < + S U C I , R A N D | | A U T N , + R E S * > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N and S Q N A U T N is in the correct range (i.e., S Q N U E < S Q N ); (2) Responder strands r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] with trace: < S U C I , + { S U C I | | S N N } K S N , H N , { R A N D | | H 1 | | H 2 } K S N , H N , + R A N D | | H 1 , H 3 , + { H 3 } K S N , H N , { R e s u l t | | K S E A F | | S U P I } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 and H 3 are three messages that are not inspected by S N , where H 2 = S H A 256 ( R A N D | | H 3 ) ; (3) Server strands t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] with trace: < { S U C I | | S N N } K S N , H N , + { R A N D | | A U T N | | H X R E S * } K S N , H N , { R E S * } K S N , H N , + { R e s u l t | | K S E A F | | S U P I } K S N , H N > . The principal associated with this strand is H N .
Definition 2.
A regular strand space II is a space for case II of the 5G AKA protocol if II is the union of three kinds of strands: (1) Initiator strands s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] with trace: < + S U C I , R A N D | | A U T N , + S y n c f | | A U T S > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N , but S Q N A U T N is not in the correct range (i.e., S Q N U E S Q N ); (2) Responder strands r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , S y n c f , H 4 ] with trace: < S U C I , + { S U C I | | S N N } K S N , H N , { R A N D | | H 1 | | H 2 } K S N , H N , + R A N D | | H 1 , S y n c f | | H 4 , + { S y n c f | | R A N D | | H 4 } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 and H 4 are three messages that are not inspected by S N ; (3) Server strands t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] with trace: < { S U C I | | S N N } K S N , H N , + { R A N D | | A U T N | | H X R E S * } K S N , H N , { S y n c f | | R A N D | | A U T S } K S N , H N > . The principal associated with this strand is H N .
Definition 3.
A regular strand space III is a space for case III of the 5G AKA protocol if III is the union of three kinds of strands: (1) Initiator strands s Init III [ U E , S N , H N , S U C I , R A N D , A U T N , M A C f ] with trace: < + S U C I , R A N D | | A U T N , + M A C f > . The principal associated with this strand is U E . X M A C computed locally is not equal to M A C A U T N . (2) Responder strands r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , M A C f ] with trace: < S U C I , + { S U C I | | S N N } K S N , H N , { R A N D | | H 1 | | H 2 } K S N , H N , + R A N D | | H 1 , M A C f , + { M A C f } K S N , H N > . The principal associated with this strand is S N . H 1 and H 2 are two messages that are not inspected by S N . (3) Server strands t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , M A C f ] with trace: < { S U C I | | S N N } K S N , H N , + { R A N D | | A U T N | | H X R E S * } K S N , H N , { M A C f } K S N , H N > . The principal associated with this strand is H N .
Definition 4.
An infiltrated mixed strand space , P is a space for the 5G AKA protocol if = I II III P , where penetrator strands p P [28,29,30].
Definition 1 gives a regular strand space for case I of the 5G AKA protocol (i.e., I ), including initiator strands, responder strands and server strands for case I of the 5G AKA protocol. Definition 2 gives a regular strand space for case II of the 5G AKA protocol (i.e., II ), including initiator strands, responder strands and server strands for case II of the 5G AKA protocol. Definition 3 gives a regular strand space for case III of the 5G AKA protocol (i.e., III ), including initiator strands, responder strands and server strands for case III of the 5G AKA protocol. Definition 4 gives an infiltrated mixed strand space for the 5G AKA protocol, including I , II , III and penetrator strands (i.e., P ).

3.2. The Initiator’s Guarantee of the 5G AKA Protocol

Theorem 1.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] ; (2) K K P and K S N * , H N K P , where S N * denotes any authorized SN; (3) R A N D is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] and a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) , S N N K S E A F , S U P I S U C I and K S E A F is generated for S U P I . Alternatively, C contains a unique server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] and a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , H 4 ] or r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) , S U P I S U C I and K S E A F is generated for S U P I .
Proof of Theorem 1.
By assumptions (2) and (3), K K P and R A N D are uniquely originating in , so M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must uniquely originate on a server strand t according to Definitions 1 to 4.
(1)
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) and S N N K S E A F . By assumption (2), K S N , H N K P , so { ( R E S * ) } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I and K S E A F is generated for S U P I . Since K S N , H N K P , { R A N D | | H 1 | | ( H X R E S * ) } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N . Hence, r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] .
(2)
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where x S U C I , S N N ( H X R E S * ) and S Q N U E A U T S . By assumption (2), K K P , so ( M A C S ) = f 1 ( K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where A U T N = S Q N A K | | A M F | | M A C and M A C = f 1 ( K , S Q N | | R A N D | | A M F ) . Since K K P , M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . By assumption (1) and Definition 1, S Q N U E < S Q N on s . However, S Q N U E S Q N on s according to Definition 2. Therefore, s and s cannot be in the same run of the protocol, so s must exist in the past run of the protocol. However, it is impossible from S Q N U E S Q N to S Q N U E < S Q N because S Q N U E increases. That is to say, it is impossible that s exists in the past run of the protocol and s exists in the current run of the protocol. Hence, t is not a server strand of Definition 2.
(3)
If t is a server strand of Definition 3, then t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where x S U C I and S N N ( H X R E S * ) . Since R A N D is uniquely originating in , R A N D originates at n 0 = < t , 2 > , where v 0 = t e r m ( < t , 2 > ) = { R A N D | | A U T N | | ( H X R E S * ) } K S N , H N . Let S = { n C : R A N D t e r m ( n ) v 0 t e r m ( n ) } . Since t e r m ( < s , 2 > ) = R A N D | | A U T N C , S is non-empty. Hence, S has at least one ≤-minimal element n 2 and the sign of n 2 is positive. n 2 does not lie on a penetrator strand but must lie on a regular strand instead (Lemma 5.4 in [29]). By inspection, n 1 precedes n 2 on the regular strand and t e r m ( n 1 ) = v 0 , and the regular strand containing n 1 and n 2 is a responder strand r . If r is a responder strand of Definition 1, then r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S N N ( R E S * ) , S U P I S U C I and K S E A F is generated for S U P I . If r is a responder strand of Definition 2, then r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , H 4 ] . If r is a responder strand of Definition 3, then r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] . □
According to Theorem 1, the corresponding attack scenarios can be obtained as shown in Figure 2, Figure 3, Figure 4 and Figure 5, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 2, Figure 3, Figure 4 and Figure 5, the green dashed box represents the initiator strand of Theorem 1, while the blue dashed boxes represent the server strands and the responder strands of Theorem 1. The fields marked in red on the server strand and the responder strand are some fields that cannot be agreed with the UE, which are caused by MitM attacks.
According to Figure 2, Figure 3, Figure 4 and Figure 5, some specific attacks can be found as follows.
(1)
U E cannot find that S U C I and S U C I are replayed because A U T N does not contain the challenge of the UE (i.e., x ), which is included in S U C I . That is to say, the replay attacks on the SN and the HN can be formed, resulting in the energy consumption ion of the SN and the HN.
(2)
U E successfully authenticates H N , but does not authenticate S N because A U T N does not contain S N N , which makes that S N N is included in ( H X R E S * ) , ( R E S * ) and K S E A F , and the principal associated with the responder strand is S N . In [14], the authors also pointed out this security issue. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
Both K S E A F and K S E A F cannot be agreed with the UE because S N N is included in them. That is to say, the key agreement fails, resulting in a new authentication and key agreement process.
(4)
In Figure 3, Figure 4 and Figure 5, there are interactions between different cases of the 5G AKA protocol, named cross attacks. They are caused by the penetrator taking advantage of S y n c f and M A C f . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(5)
In Figure 3 and Figure 4, the penetrator replays an encrypted M A C f between the SN and the HN to make authentication failure. In Figure 5, the penetrator directly sends M A C f to the SN to make authentication failure. They are called MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(6)
The server strand and the responder strand of Theorem 1 may exist in the past run of the protocol because they do not contain the challenge of the UE (i.e., x ), which is included in S U C I . That is to say, R A N D | | A U T N on the UE may be a replayed message and S Q N A U T N is still in the correct range. As a result, the location privacy of the UE can be compromised by reidentifying R E S * . That is to say, the location privacy of the UE can be compromised.
Theorem 2.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] ; (2) K K P and K S N * , H N K P , where S N * denotes any authorized SN; (3) R A N D is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] and a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , and both t and r must exist in the past run of the protocol, where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) , S N N K S E A F , S U P I S U C I and K S E A F is generated for S U P I . Alternatively, C contains a unique server strand t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] and a responder strand r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where x S U C I , S N N ( H X R E S * ) , S Q N U E A U T S and S U P I S U C I . Alternatively, C contains a unique server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] and a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , H 4 ] or r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) , S U P I S U C I and K S E A F is generated for S U P I , and both t and r must exist in the past run of the protocol when r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] .
Proof of Theorem 2.
By assumptions (2) and (3), K K P and R A N D are uniquely originating in , so M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must uniquely originate on a server strand t according to Definitions 1 to 4.
(1)
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where x S U C I , S N N ( H X R E S * ) , S N N ( R E S * ) and S N N K S E A F . By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, ( R E S * ) = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where A U T N = S Q N A K | | A M F | | M A C and M A C = f 1 ( K , S Q N | | R A N D | | A M F ) . Since K K P , M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . By assumption (1) and Definition 2, S Q N U E S Q N on s . However, S Q N U E < S Q N on s according to Definition 1. Therefore, s and s cannot be in the same run of the protocol, so s must exist in the past run of the protocol. Because S Q N U E increases, it is possible from S Q N U E < S Q N to S Q N U E S Q N . That is to say, it is possible that s exists in the past run of the protocol and s exists in the current run of the protocol. Hence, it is possible that t is a server strand of Definition 1. By assumption (2), K S N , H N K P , so { ( R E S * ) } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I and K S E A F is generated for S U P I . Since K S N , H N K P , { R A N D | | H 1 | | ( H X R E S * ) } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N . Hence, r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] . From the above, s exists in the past run of the protocol and M A C A U T N t e r m ( < s , 2 > ) originates on t , so t must exist in past run of the protocol. From the above, { ( R E S * ) } K S N , H N = t e r m ( < t , 3 > ) originates on r , so r also must exist in the past run of the protocol.
(2)
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where x S U C I , S N N ( H X R E S * ) and S Q N U E A U T S . By assumption (2), K S N , H N K P , so { S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Since K S N , H N K P , { R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N and H 2 = ( H X R E S * ) . Hence, r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] .
(3)
If t is a server strand of Definition 3, then t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where x S U C I and S N N ( H X R E S * ) . Since R A N D is uniquely originating in , R A N D originates at n 0 = < t , 2 > , where v 0 = t e r m ( < t , 2 > ) = { R A N D | | A U T N | | ( H X R E S * ) } K S N , H N . Let S = { n C : R A N D t e r m ( n ) v 0 t e r m ( n ) } . Since t e r m ( < s , 2 > ) = R A N D | | A U T N C , S is non-empty. Hence, S has at least one ≤-minimal element n 2 and the sign of n 2 is positive. n 2 does not lie on a penetrator strand but must lie on a regular strand instead (Lemma 5.4 in [29]). By inspection, n 1 precedes n 2 on the regular strand and t e r m ( n 1 ) = v 0 , and the regular strand containing n 1 and n 2 is a responder strand r . If r is a responder strand of Definition 1, then r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S N N ( R E S * ) , S U P I S U C I and K S E A F is generated for S U P I . From the above, it is possible that r is a responder strand of Definition 1 because it is possible from S Q N U E < S Q N to S Q N U E S Q N , and both r and t must exist in the past run of the protocol. If r is a responder strand of Definition 2, then r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , H 4 ] . If r is a responder strand of Definition 3, then r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] . □
According to Theorem 2, the corresponding attack scenarios can be obtained as shown in Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, the green dashed box represents the initiator strand of Theorem 2, while the blue dashed boxes represent the server strand and the responder strand of Theorem 2. The fields marked in red on the server strand and the responder strand are some fields that cannot be agreed with the UE, which are caused by MitM attacks.
According to Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, some specific attacks can be found as follows:
(1)
U E cannot find that S U C I and S U C I are replayed because A U T N does not contain the challenge of the UE (i.e., x ), which is included in S U C I . That is to say, the replay attacks on the SN and the HN can be formed, resulting in the energy consumption ion of the SN and the HN.
(2)
U E successfully authenticates H N , but does not authenticate S N because A U T N does not contain S N N , which means that S N N is included in ( H X R E S * ) , ( R E S * ) and K S E A F , and the principal associated with the responder strand is S N . In [14], the authors also pointed out this security issue. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
In Figure 6, Figure 8, Figure 9 and Figure 10, there are interactions between different cases of the 5G AKA protocol, i.e., cross attacks. They are caused by the penetrators taking advantage of S y n c f and M A C f . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(4)
In Figure 8 and Figure 9, the penetrator replays an encrypted M A C f between the SN and the HN to make authentication failure. In Figure 10, the penetrator directly sends M A C f to the SN to make authentication failure. They are called MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(5)
The server strand and the responder strand of Theorem 2 in Figure 6 and Figure 8 only exist in the past run of the protocol according to Theorem 2, i.e., R A N D | | A U T N on the initiator strand of Theorem 2 in Figure 6 and Figure 8 is a replayed message and S Q N A U T N is not in the correct range. As a result, the location privacy of the UE can be compromised by identifying S y n c f . Further, the server strand and the responder strand of Theorem 2 in Figure 7, Figure 9 and Figure 10 may exist in the past run of the protocol because they do not contain the challenge of the UE (i.e., x ), which is included in S U C I . That is to say, R A N D | | A U T N on the UE in Figure 7, Figure 9 and Figure 10 can be a replayed message and S Q N A U T N is not in the correct range. As a result, the location privacy of the UE can be compromised by identifying S y n c f . In [14,15,18,24], the authors also exploited this attack. That is to say, the location privacy of the UE can be compromised.
Theorem 3.
Suppose: is a space for the 5G AKA protocol, and C is a bundle containing an initiator strand s Init III [ U E , S N , H N , S U C I , R A N D , A U T N , M A C f ] . Then, the penetrator can complete the entire message exchange without any responder strand or server strand.
Proof of Theorem 3.
By the above assumption and Definition 3, X M A C computed locally is not equal to M A C A U T N t e r m ( < s , 2 > ) , so M A C does not originate on any responder strand and server strand. □
According to Theorem 3, the corresponding attack scenario can be obtained as shown in Figure 11.
In Figure 11, the green dashed box represents the initiator strand of Theorem 3. According to Figure 11, U E does not authenticate S N and H N . The penetrator P can perform a masquerading attack, where R A N D | | A U T N is forged or tampered by P . In the other words, the penetrator can forge or tamper with R A N D | | A U T N to make the UE respond to a “MAC failure” indication, resulting in authentication failure. This is also called MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.

3.3. The Server’s Guarantee of the 5G AKA Protocol

Theorem 4.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] ; (2) K K P and K S N * , H N K P , where S N * denotes any authorized SN; (3) R A N D is uniquely originating in . Then, C contains an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] and a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where x S U C I , S U P I S U C I and K S E A F is generated for S U P I .
Proof of Theorem 4.
By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] , where x S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] . By assumption (2), K S N , H N K P , so { R E S * } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I and K S E A F is generated for S U P I . Since K S N , H N K P , { R A N D | | H 1 | | H X R E S * } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N . Hence, r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . □
According to Theorem 4, the corresponding attack scenario can be obtained as shown in Figure 12, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 12, the green dashed box represents the server strand of Theorem 4, while the blue dashed boxes represent the initiator strand and the responder strand of Theorem 4. The fields marked in red on the initiator strand and the responder strand are some fields that cannot be agreed with the HN, which are caused by MitM attacks.
According to Figure 12, H N successfully authenticates U E and S N , but some specific attacks can be found as follows:
(1)
H N cannot find that S U C I is replayed, which is not equal to S U C I and S U C I . This is because S U C I does not contain the challenge of the HN (i.e., R A N D ). That is to say, the replay attacks on the HN can be formed, resulting in the energy consumption ion of the HN.
(2)
K S E A F and S U P I cannot be agreed with the HN because the HN does not send K S E A F and S U P I together with R A N D , which makes that K S E A F and S U P I can be a replayed key and a replayed SUPI, respectively. That is to say, the key agreement fails, resulting in a new authentication and key agreement process.
Theorem 5.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a server strand t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] ; (2) K K P and K S N * , H N K P , where S N * denotes any authorized SN; (3) R A N D is uniquely originating in . Then, C contains an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] and a responder strand r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] , where x S U C I and S U P I S U C I .
Proof of Theorem 5.
By assumption (2), K K P , so M A C S = f 1 ( K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where x S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] . By assumption (2), K S N , H N K P , so { S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Since K S N , H N K P , { R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N and H 2 = H X R E S * . Hence, r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] . □
According to Theorem 5, the corresponding attack scenario can be obtained as shown in Figure 13, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 13, the green dashed box represents the server strand of Theorem 5, while the blue dashed boxes represent the initiator strand and the responder strand of Theorem 5. The fields marked in red on the initiator strand and the responder strand are some fields that cannot be agreed with the HN, which are caused by MitM attacks.
According to Figure 13, H N successfully authenticates U E and S N . However, H N cannot find that S U C I is replayed, which is not equal to S U C I and S U C I . This is because S U C I does not contain the challenge of the HN (i.e., R A N D ). That is to say, the replay attacks on the HN can be formed, resulting in the energy consumption ion of the HN.
Theorem 6.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , H X R E S * , M A C f ] ; (2) K S N * , H N K P , where S N * denotes any authorized SN. Then, C contains a responder strand r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , M A C f ] , where S U P I S U C I .
Proof of Theorem 6.
By assumption (2), K S N , H N K P , so { M A C f } K S N , H N = t e r m ( < s , 3 > ) must originate on a responder strand r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , M A C f ] , where S U P I S U C I . □
According to Theorem 6, the corresponding attack scenario can be obtained as shown in Figure 14, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 14, the green dashed box represents the server strand of Theorem 6, while the blue dashed box represents the responder strand of Theorem 6. The fields marked in red on the responder strand are some fields that cannot be agreed with the HN, which are caused by MitM attacks.
According to Figure 14, H N successfully authenticates S N , but only authenticates U E based on S U C I , and some specific attacks can be found as follows.
(1)
H N cannot find that S U C I is replayed, which is not equal to S U C I . This is because S U C I does not contain the challenge of the HN (i.e., R A N D ). That is to say, the replay attacks on the HN can be formed, resulting in the energy consumption ion of the HN.
(2)
The penetrator directly sends M A C f to the SN to make authentication failure. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
The responder strand of Theorem 6 may exist in the past run of the protocol because it does not contain the challenge of the HN, i.e., { M A C f } K S N , H N on the HN of Theorem 6 can be a replayed message, resulting in a replay attack. In the other words, the penetrator replays an encrypted M A C f between the SN and the HN to make an authentication failure. That is to say, the authentication fails, resulting in a new authentication and key agreement process.

3.4. The Responder’s Guarantee of the 5G AKA Protocol

Theorem 7.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] ; (2) K * K P and K S N * , H N K P , where S N * denotes any authorized SN and K * denotes a pre-shared key between H N and any authorized U E ; (3) R A N D is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] and an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K ( R E S * ) , K K S E A F and K S E A F is generated for S U P I . Alternatively, C contains a unique server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] and an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I , S U P I S U C I , K A U T N and K ( H X R E S * ) .
Proof of Theorem 7.
By assumptions (2) and (3), K S N , H N K P and R A N D are uniquely originating in , so { R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 1 to 4.
(1)
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , K A U T N , K ( H X R E S * ) , K ( R E S * ) , K K S E A F and K S E A F is generated for S U P I . By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, ( R E S * ) = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] .
(2)
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , K A U T N , K ( H X R E S * ) , K A U T S and S Q N U E A U T S . By Definition 1, ( R E S * ) = K D F ( C K | | I K , S N N | | R A N D | | R E S ) = t e r m ( < r , 5 > ) . By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, ( R E S * ) = t e r m ( < r , 5 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] . By assumption (2), K K P , so ( M A C S ) = f 1 ( K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] . By Definition 1, S Q N U E < S Q N on s . However, S Q N U E S Q N on s according to Definition 2. Therefore, s and s cannot be in the same run of the protocol, so s or s must exist in the past run of the protocol. Since s or s exists in the past run of the protocol, t must exist in the past run of the protocol. Because ( M A C S ) A U T S t e r m ( < t , 3 > ) originates on s , s must exist in the past run of the protocol, so s must exist in the current run of the protocol. However, it is impossible from S Q N U E S Q N to S Q N U E < S Q N because S Q N U E increases. That is to say, it is impossible that s exists in the past run of the protocol and s exists in the current run of the protocol. Hence, t is not a server strand of Definition 2.
(3)
If t is a server strand of Definition 3, then t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where S U P I S U C I , K A U T N and K ( H X R E S * ) . By Definition 1, ( R E S * ) = K D F ( C K | | I K , S N N | | R A N D | | R E S ) = t e r m ( < r , 5 > ) . By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, ( R E S * ) = t e r m ( < r , 5 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] . □
According to Theorem 7, the corresponding attack scenarios can be obtained as shown in Figure 15 and Figure 16, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 15 and Figure 16, the green dashed box represents the responder strand of Theorem 7, while the blue dashed boxes represent the initiator strand and the server strand of Theorem 7. The fields marked in red on the initiator strand and the server strand are some fields that cannot be agreed with the SN, which are caused by MitM attacks.
According to Figure 15 and Figure 16, some specific attacks can be found as follows:
(1)
S N successfully authenticates H N , but does not authenticate U E . This is because S N cannot inspect A U T N , ( H X R E S * ) and ( R E S * ) , and S U P I is not sent with R A N D , which means that A U T N , ( H X R E S * ) and ( R E S * ) can be related to S U P I rather than S U P I . Accordingly, S U P I is included in S U C I and S U C I , and is related to K S E A F . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(2)
In Figure 16, there are interactions between different cases of the 5G AKA protocol, i.e., cross attacks. They are caused by the penetrators taking advantage of M A C f . The penetrator replays an encrypted M A C f between the SN and the HN to make authentication failure, i.e., MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
The initiator strand and the server strand of Theorem 7 may exist in the past run of the protocol because they do not contain the challenge of the SN, i.e., the messages received by the SN can be replayed messages. As a result, the penetrator can impersonate the UE and the HN to complete the entire 5G AKA protocol with the SN, forming DoS attacks on the SN. This results in the energy consumption ion of the SN.
Theorem 8.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a responder strand r Resp II [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , S y n c f , H 4 ] ; (2) K * K P and K S N * , H N K P , where S N * denotes any authorized SN and K * denotes a pre-shared key between H N and any authorized U E ; (3) R A N D is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] and an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K ( R E S * ) , K K S E A F and K S E A F is generated for S U P I . Alternatively, C contains a unique server strand t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] and an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K A U T S and S Q N U E A U T S . Alternatively, C contains a unique server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where S U P I S U C I , K A U T N and K ( H X R E S * ) .
Proof of Theorem 8.
By assumptions (2) and (3), K S N , H N K P and R A N D are uniquely originating in , so { R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 1 to 4.
(1)
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , K A U T N , K ( H X R E S * ) , K ( R E S * ) , K K S E A F and K S E A F is generated for S U P I . By assumption (2), K K P . Since C K = f 3 ( K , R A N D ) and I K = f 4 ( K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, ( R E S * ) = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] .
(2)
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , K A U T N , K ( H X R E S * ) , K A U T S and S Q N U E A U T S . By assumption (2), K K P , so ( M A C S ) = f 1 ( K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S U P I S U C I and S Q N A U T N . Since K K P , M A C = f 1 ( K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] .
(3)
If t is a server strand of Definition 3, then t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where S U P I S U C I , K A U T N and K ( H X R E S * ) . □
According to Theorem 8, the corresponding attack scenarios can be obtained, as shown in Figure 17, Figure 18 and Figure 19, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 17, Figure 18 and Figure 19, the green dashed box represents the responder strand of Theorem 8, while the blue dashed boxes represent the initiator strand and the server strand of Theorem 8. The fields marked in red on the initiator strand and the server strand are some fields that cannot be agreed with the SN, which are caused by MitM attacks.
According to Figure 17, Figure 18 and Figure 19, some specific attacks can be found as follows.
(1)
S N successfully authenticates H N , but does not authenticate U E . This is because S N cannot inspect A U T N , ( H X R E S * ) and ( R E S * ) , which means that A U T N , ( H X R E S * ) and ( R E S * ) can be related to S U P I rather than S U P I . Accordingly, S U P I is included in S U C I and S U C I , and is related to K S E A F . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(2)
In Figure 17 and Figure 19, there are interactions between different cases of the 5G AKA protocol, i.e., cross attacks. They are caused by the penetrators taking advantage of S y n c f and M A C f . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
In Figure 19, the penetrator replays an encrypted M A C f between the SN and the HN to make authentication failure, i.e., MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(4)
The initiator strand and the server strand of Theorem 8 may exist in the past run of the protocol, i.e., the messages received by the SN can be replayed messages. As a result, the penetrator can impersonate the UE and the HN to complete the entire 5G AKA protocol with the SN, forming DoS attacks on the SN. This results in the energy consumption ion of the SN.
Theorem 9.
Suppose: (1) is a space for the 5G AKA protocol, and C is a bundle containing a responder strand r Resp III [ U E , S N , H N , S U C I , S N N , R A N D , H 1 , H 2 , M A C f ] ; (2) K * K P and K S N * , H N K P , where S N * denotes any authorized SN and K * denotes a pre-shared key between H N and any authorized U E ; (3) R A N D is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] and an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , ( R E S * ) ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K ( R E S * ) , K K S E A F and K S E A F is generated for S U P I . Alternatively, C contains a unique server strand t Serv II [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] and an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K A U T S and S Q N U E A U T S . Alternatively, C contains a unique server strand t Serv III [ U E , S N , H N , S U C I , S N N , R A N D , A U T N , ( H X R E S * ) , M A C f ] , where S U P I S U C I , S U P I S U C I , K A U T N , K ( H X R E S * ) , K A U T S and S Q N U E A U T S .
Proof of Theorem 9.
It is the same as Theorem 8. □
According to Theorem 9, the corresponding attack scenarios can be obtained as shown in Figure 20, Figure 21 and Figure 22, where the messages between the HN and the authorized SN are protected by their session key.
In Figure 20, Figure 21 and Figure 22, the green dashed box represents the responder strand of Theorem 9, while the blue dashed boxes represent the initiator strand and the server strand of Theorem 9. The fields marked in red on the initiator strand and the server strand are some fields that cannot be agreed with the SN, which are caused by MitM attacks.
According to Figure 20, Figure 21 and Figure 22, some specific attacks can be found as follows.
(1)
S N successfully authenticates H N , but does not authenticate U E . This is because S N cannot inspect A U T N , ( H X R E S * ) and ( R E S * ) , which makes that A U T N , ( H X R E S * ) and ( R E S * ) can be related to S U P I rather than S U P I . Accordingly, S U P I is included in S U C I and S U C I , and is related to K S E A F . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(2)
In Figure 20 and Figure 21, there are interactions between different cases of the 5G AKA protocol, i.e., cross attacks. They are caused by the penetrators taking advantage of S y n c f and M A C f . That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(3)
In Figure 20, Figure 21 and Figure 22, the penetrator directly sends M A C f to the SN to make an authentication failure, i.e., MAC failure attacks. That is to say, the authentication fails, resulting in a new authentication and key agreement process.
(4)
The initiator strand and the server strand of Theorem 9 may exist in the past run of the protocol, i.e., the messages received by the SN can be replayed messages. As a result, the penetrator can impersonate the UE and the HN to complete the entire 5G AKA protocol with the SN, thus forming DoS attacks on the SN. This results in the energy consumption ion of the SN.

4. Our Proposed 5G-AKA’ Protocol and Its Security Analysis

4.1. The 5G-AKA’ Protocol

In order to overcome the above security problems of the latest version of the 5G AKA protocol, we propose a 5G-AKA’ protocol, which is illustrated in Figure 23.
Compared with the latest version of the 5G AKA protocol, the main improvements of our proposed 5G-AKA’ protocol are as follows:
  • To cryptographically bind x y G and S N N to K , and protect K , we replace K with B K on the UE and the HN.
    B K = K D F ( K , x y G | | S N N )
    where B K is a base key derived from K .
  • To prevent DoS attacks on the SN, we add the challenge–response mechanism between the SN and the HN. In detail, we add R A N D S N to the first three messages between the SEAF (located in the SN) and the AUSF (located in the HN) and add R A N D to the fourth message between the SEAF and the AUSF, where R A N D S N is an unpredictable challenge of the SEAF;
  • Add S U P I to the second message between the SEAF and the AUSF, matching with S U C I in the first message between them;
  • In the latest version of the 5G AKA protocol, M A C f is used to initiate a new authentication procedure for the UE. However, it causes a large number of attacks according to the above security analysis. Hence, we use a timeout mechanism on the HN instead of M A C f to initiate a new authentication procedure towards the UE. That is to say, if X M A C and M A C are different, then the UE directly discards the receives R A N D | | A U T N , and the HN will initiate a new authentication procedure towards the UE when the HN does not receive an authentication response message or a synchronization failure message within a certain period of time.
According to the above descriptions, our proposed 5G-AKA’ protocol can be summarized into two cases as follows:
Case (I): the verification of A U T N succeeds and the authentication is successful. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { R A N D S N | | S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D | | A U T N ;
  • U E S N : R E S * ;
  • S N H N : { R A N D S N | | R E S * } K S N , H N ;
  • H N S N : { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N .
where S U C I , R A N D | | A U T N and R E S * are three messages exchanged between the UE and SN, { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N , { R A N D S N | | R E S * } K S N , H N and { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N are four messages exchanged between the SN and the HN.
Case (II): the verification of A U T N fails and it is a synchronization failure. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { R A N D S N | | S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D | | A U T N ;
  • U E S N : S y n c f | | A U T S ;
  • S N H N : { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N .
where S U C I , R A N D | | A U T N and S y n c f | | A U T S are three messages exchanged between the UE and SN, { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N and { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N are three messages exchanged between the SN and the HN.
In the above cases, K is replaced with B K . Similarly, we use the mixed strand space model [28] to analyze the security of our proposed 5G-AKA’ protocol as follows.

4.2. Mixed Strand Space for the 5G-AKA’ Protocol

Definition 5.
A regular strand space I is a space for case I of the 5G-AKA’ protocol if I is the union of three kinds of strands: (1) Initiator strands s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] with trace: < + S U C I , R A N D | | A U T N , + R E S * > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N and S Q N A U T N is in the correct range (i.e., S Q N U E < S Q N ); (2) Responder strands r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] with trace: < S U C I , + { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N , + R A N D | | H 1 , H 3 , + { R A N D S N | | H 3 } K S N , H N , { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 and H 3 are three messages that are not inspected by S N , where H 2 = S H A 256 ( R A N D | | H 3 ) ; (3) Server strands t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] with trace: < { R A N D S N | | S U C I | | S N N } K S N , H N , + { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N , { R A N D S N | | R E S * } K S N , H N , + { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N > . The principal associated with this strand is H N .
Definition 6.
A regular strand space II is a space for case II of the 5G-AKA’ protocol if II is the union of three kinds of strands: (1) Initiator strands s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] with trace: < + S U C I , R A N D | | A U T N , + S y n c f | | A U T S > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N , but S Q N A U T N is not in the correct range (i.e., S Q N U E S Q N ); (2) Responder strands r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , S y n c f , H 4 ] with trace: < S U C I , + { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N , + R A N D | | H 1 , S y n c f | | H 4 , + { R A N D S N | | S y n c f | | R A N D | | H 4 } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 and H 4 are three messages that are not inspected by S N ; (3) Server strands t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] with trace: < { R A N D S N | | S U C I | | S N N } K S N , H N , + { R A N D S N | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N , { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N > . The principal associated with this strand is H N .
Definition 7.
An infiltrated strand space , P is a space for the 5G-AKA’ protocol if = I II P , where penetrator strands p P [28,29,30].
Definition 5 gives a regular strand space for case I of the 5G-AKA’ protocol (i.e., I ), including initiator strands, responder strands and server strands for case I of the 5G-AKA’ protocol. Definition 6 gives a regular strand space for case II of the 5G-AKA’ protocol (i.e., II ), including initiator strands, responder strands and server strands for case II of the 5G AKA protocol. Definition 7 gives an infiltrated mixed strand space for the 5G-AKA’ protocol, including I , II  and penetrator strands (i.e., P ).

4.3. The Initiator’s Guarantee of the 5G-AKA’ Protocol

Theorem 10.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] and a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] .
Proof of Theorem 10.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). Because M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) and R A N D is uniquely originating in , M A C A U T N t e r m ( < s , 2 > )  must uniquely originate on a server strand t according to Definitions 5 to 7.
(1)
If t is a server strand of Definition 5, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . By assumptions (2) and (3), K S N , H N K P and R A N D S N are uniquely originating in , so { R A N D S N | | R E S * } K S N , H N = t e r m ( < t , 3 > ) must originate on a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I . Since K S N , H N K P , { R A N D S N | | S U P I | | R A N D | | H 1 | | H X R E S * } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N , S U P I = S U P I and U E = U E . Since K S N , H N K P , { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N = t e r m ( < r , 7 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so K S E A F = K S E A F . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I . Hence, r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] .
(2)
If t is a server strand of Definition 6, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] , where S Q N U E A U T S . Since B K K P , M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 )   A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U P I , S U C I , R A N D , A U T N , S y n c f , A U T S ] , so x originates on t e r m ( < s , 1 > ) . By assumptions (1) and (2), x originates on t e r m ( < s , 1 > ) . Since x is uniquely originating in , s = s . However, s Init II and s Init I , s s . Hence, t is not a server strand of Definition 6. □
Theorem 11.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] and a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] .
Proof of Theorem 11.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). Because M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) and R A N D are uniquely originating in , M A C A U T N t e r m ( < s , 2 > ) must uniquely originate on a server strand t according to Definitions 5 to 7.
(1)
If t is a server strand of Definition 5, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . Since B K K P , C K = f 3 ( B K , R A N D ) K P and I K = f 4 ( B K , R A N D ) K P , so C K | | I K K P . Hence, R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] , so x originates on t e r m ( < s , 1 > ) . By assumptions (1) and (2), x originates on t e r m ( < s , 1 > ) . Since x is uniquely originating in , s = s . However, s Init I and s Init II , s s . Hence, t is not a server strand of Definition 5.
(2)
If t is a server strand of Definition 6, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] , where S Q N U E A U T S . Since B K K P , M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 )   A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s . Since x is uniquely originating in , s = s , so S Q N U E = S Q N U E and A U T S = A U T S . Hence, t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] . By assumptions (2) and (3), K S N , H N K P and R A N D S N are uniquely originating in , so { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Since K S N , H N K P , { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S U P I = S U P I , U E = U E , H 1 = A U T N and H 2 = H X R E S * . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I . Hence, r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] . □
According to Theorems 10 and 11, U E successfully authenticates H N and S N , and all fields except R A N D S N on the sever strand and the responder are agreed with the UE. R A N D S N is unknowable to the UE because it is mainly used for the challenge–response mechanism between the SN and the HN, which does not affect the security of the 5G-AKA’ protocol. Hence, MitM attacks are prevented.
In addition, those attacks in Section 3.2 are overcome as follows:
(1)
Since B K = K D F ( K , x y G | | S N N ) is used to calculate A U T N , the challenge of the UE (i.e., x ), the pre-shared key between the UE and the HN (i.e., K ) and S N N are included in A U T N . As a result, U E can find whether S U C I is replayed, U E successfully authenticates H N and S N , and R A N D | | A U T N on the UE cannot be replayed, making that the location privacy of the UE cannot be compromised.
(2)
Since M A C f is replaced with a timeout mechanism on the HN, MAC failure attacks are prevented. Further, R A N D | | A U T N on the UE cannot be replayed maliciously to generate S y n c f . As a result, the penetrator cannot take advantage of S y n c f and M A C f to performed cross attacks.

4.4. The Server’s Guarantee of the 5G-AKA’ Protocol

Theorem 12.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing a server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] and a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] .
Proof of Theorem 12.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). Because C K = f 3 ( B K , R A N D ) and I K = f 4 ( B K , R A N D ) , C K K P and I K K P , so C K | | I K K P . By assumption (3), x is uniquely originating in , so R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] , where S Q N A U T N . Since B K K P , M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] . By assumptions (2) and (3), K S N , H N K P and R A N D S N are uniquely originating in , so { R A N D S N | | R E S * } K S N , H N = t e r m ( < t , 3 > ) must originate on a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I . Since K S N , H N K P , { R A N D S N | | S U P I | | R A N D | | H 1 | | H X R E S * } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so H 1 = A U T N , S U P I = S U P I and U E = U E . Since K S N , H N K P , { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N = t e r m ( < r , 7 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so K S E A F = K S E A F . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I . Hence, r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . □
Theorem 13.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing a server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] and a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] .
Proof of Theorem 13.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). By assumption (3), x is uniquely originating in , so M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S Q N A U T N . Since B K K P , M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] . By assumptions (2) and (3), K S N , H N K P and R A N D S N are uniquely originating in , so { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Since K S N , H N K P , { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S U P I = S U P I , U E = U E , H 1 = A U T N and H 2 = H X R E S * . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I . Hence, r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] . □
According to Theorems 12 and 13, H N successfully authenticates U E and S N , and all fields on the initiator strand and the responder are agreed with the HN, so MitM attacks are prevented.
In addition, those attacks in Section 3.3 are overcome as follows:
(1)
Although H N cannot find that S U C I is replayed because S U C I does not contain the challenge of the HN (i.e., R A N D ), U E can find whether S U C I is replayed because B K = K D F ( K , x y G | | S N N ) is used to calculate A U T N . Hence, this does not affect the security of the 5G-AKA’ protocol.
(2)
Since M A C f is replaced with a timeout mechanism on the HN, MAC failure attacks are prevented.
(3)
Since the HN sends K S E A F and S U P I together with R A N D , they can be agreed with the HN.

4.5. The Responder’s Guarantee of the 5G-AKA’ Protocol

Theorem 14.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] and a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] .
Proof of Theorem 14.
By assumptions (2) and (3), K S N , H N K P and R A N D are uniquely originating in , so { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 5 to 7.
(1)
If t is a server strand of Definition 5, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) , x ( R E S * ) , x K S E A F and K S E A F is generated for S U P I . Since K S N , H N K P , { R A N D | | R e s u l t | | K S E A F | | S U P I } K S N , H N = t e r m ( < r , 7 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so K S E A F = K S E A F . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I and x = x according to assumption (1). As a result, A U T N = A U T N , ( H X R E S * ) = H X R E S * and ( R E S * ) = R E S * . Hence, t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). Because C K = f 3 ( B K , R A N D ) and I K = f 4 ( B K , R A N D ) , C K K P and I K K P , so C K | | I K K P . By assumption (3), x is uniquely originating in , so R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] , where S Q N A U T N . Since B K K P , M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init I [ U E , S N , H N , S U C I , R A N D , A U T N , R E S * ] .
(2)
If t is a server strand of Definition 6, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) and x A U T S . Since K S N , H N K P , { R A N D S N | | S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , S y n c f , A U T S ] , so R A N D S N originates on t e r m ( < r , 2 > ) . By assumptions (1) and (2), R A N D S N originates on t e r m ( < r , 2 > ) . Since R A N D S N is uniquely originating in , r = r . However, r Resp II and r Resp I , r r . Hence, t is not a server strand of Definition 6. □
Theorem 15.
Suppose: (1) is a space for the 5G-AKA’ protocol, and C is a bundle containing a responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , S y n c f , H 4 ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N is uniquely originating in . Then, C contains a unique server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] and a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] .
Proof of Theorem 15.
By assumptions (2) and (3), K S N , H N K P and R A N D and uniquely originating in , so { R A N D S N | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 5 to 7.
(1)
If t is a server strand of Definition 5, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) , x ( R E S * ) , x K S E A F and K S E A F is generated for S U P I . Since K S N , H N K P , { R A N D S N | | ( R E S * ) } K S N , H N = t e r m ( < t , 3 > ) must originate on a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , so R A N D S N originates on t e r m ( < r , 2 > ) . By assumptions (1) and (2), R A N D S N originates on t e r m ( < r , 2 > ) . Since R A N D S N is uniquely originating in , r = r . However, r Resp I and r Resp II , r r . Hence, t is not a server strand of Definition 5.
(2)
If t is a server strand of Definition 6, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) and x A U T S . Since K S N , H N K P , { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N is uniquely originating in , r = r , so S U C I = S U C I and x = x according to assumption (1). As a result, A U T N = A U T N , ( H X R E S * ) = H X R E S * and A U T S = A U T S . Hence, t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] . Since B K = K D F ( K , x y G | | S N N ) , B K K P according to assumption (2). By assumption (3), x is uniquely originating in , so M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] , where S Q N A U T N . Since B K K P , M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D is uniquely originating in , t = t , so S Q N = S Q N and A U T N = A U T N . Hence, s Init II [ U E , S N , H N , S U C I , R A N D , A U T N , S y n c f , A U T S ] . □
According to Theorems 14 and 15, S N successfully authenticates U E and H N , and all fields on the initiator strand and the responder are agreed with the HN, so MitM attacks are prevented.
In addition, those attacks in Section 3.4 are overcome as follows:
(1)
Since S U P I is added to the second message between the SN and the HN, and R A N D is added to the fourth message between the SN and the HN, both K S E A F and S U P I on the HN can be agreed with the SN, which means that S N successfully authenticates U E and obtains the corresponding K S E A F .
(2)
Since M A C f is replaced with a timeout mechanism on the HN, MAC failure attacks are prevented. Further, R A N D | | A U T N on the UE cannot be replayed maliciously to generate S y n c f because B K = K D F ( K , x y G | | S N N ) . As a result, the penetrator cannot take advantage of S y n c f and M A C f to performed cross attacks.
(3)
Since the challenge–response mechanism between the SN and the HN is added, the messages received by the SN cannot be replayed, preventing Dos attacks on the SN.

5. Discussion

5.1. Security of the 5G-AKA’ Protocol

According to the above security analysis of the latest version of the 5G AKA protocol, twenty-one attack scenarios can be obtained, where thirteen attack scenarios are related to M A C f . In our proposed 5G-AKA’ protocol, M A C f is replaced with a timeout mechanism on the HN, so the thirteen attack scenarios are eliminated. As a result, those attacks in the thirteen attack scenarios are eliminated, including MAC failure attacks.
Without considering M A C f , the comparative analysis of authentication properties [28,29,30] between the latest version of the 5G AKA protocol and our proposed 5G-AKA’ protocol is shown in Table 1.
From Table 1, in the latest version of the 5G AKA protocol, only the weaker agreement can be established, and even weak agreement cannot be established in the cases of “UE to SN” and “SN to UE”, because the UE cannot authenticate the SN, and the SN cannot authenticate the UE. However, in our proposed 5G-AKA’ protocol, mutual authentication and injection agreement among the UE, the SN and the HN can be established in all cases according to the security analysis of the 5G-AKA’ protocol.
According to the above security analysis of the latest version of the 5G AKA protocol, based on those missing agreements, the penetrator can perform MitM attacks and cross attacks. Additionally, based on replayed messages, replay attacks and masquerading attacks can be performed, the location privacy of the UE can be compromised and DoS attacks on the SN can be formed. However, according to the above security analysis of the 5G-AKA’ protocol, our proposed 5G-AKA’ protocol has overcome these attacks.
In terms of secrecy properties, the keys established in the latest version of the 5G AKA protocol are secret. However, if K is leaked, then the attacker can calculate K A U S F and K S E A F based on those messages transmitted in the past run of the protocol. As a result, the attacker can decrypt those encrypted messages transmitted in the past run of the protocol. Therefore, the latest version of the 5G AKA protocol does not provide perfect forward secrecy. However, in our proposed 5G-AKA’ protocol, K is replaced with B K = K D F ( K , x y G | | S N N ) , providing perfect forward secrecy based on Diffie–Hellman exchange.
Therefore, our proposed 5G-AKA’ protocol is secure and can overcome those security problems of the latest version of the 5G AKA protocol. The comparative analysis of security properties between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24] is shown in Table 2.
From Table 2, only some security properties can be guaranteed in the 5G AKA protocol and these recently improved 5G AKA protocols, but all security properties can be guaranteed in our proposed 5G-AKA’ protocol.
In [22], A U T N contains the challenge of the UE (i.e., r U E ), so the first received message of the UE cannot be a replayed message, preventing the location privacy of the UE from being compromised. However, A U T N does not contains S N N , so the UE cannot authenticate the SN. Because the UE and the HN cannot reach an agreement in S N N , MitM attacks can be performed. Since the MAC failure is inherited from the 5G AKA protocol, cross attacks and MAC failure attacks still exist in the protocol of [22]. The received messages of the SN do not contain the challenge of the SN (i.e., r S E A F ), so these messages can be replayed messages, forming replay attacks, masquerading attacks and Dos attacks on the SN. In addition, K A U S F and K S E A F are encrypted, so key secrecy is provided, but perfect forward secrecy cannot be provided because K A U S F and K S E A F can be calculated when K is leaked.
In [23], the Eph Private key and Eph Public key of the UE, the public/private key pair of the SN and the public/private key pair of the HN are used to ensure the security of the channel between the UE and the SN, the security of channel between the UE and the HN, and the security of channel between the SN and the HN. Since the first received message of the UE is encrypted by the Eph Public key of the UE, this means that the message can only be decrypted by the Eph Private key of the UE, so it cannot be a replayed message, preventing the location privacy of the UE being compromised. However, the other parts fully inherit the 5G AKA protocol, so the other attacks of the 5G AKA protocol still exist in the protocol of [23]. Similarly, perfect forward secrecy cannot be provided.
In [24], both the synchronization failure and the MAC failure are constructed as the format of R E S * , making it impossible to distinguish them, so as to prevent the location privacy of the UE from being compromised and prevent cross attacks and MAC failure attacks. However, the other parts fully inherit the 5G AKA protocol, so the other attacks of the 5G AKA protocol still exist in the protocol of [24]. Similarly, perfect forward secrecy cannot be provided.
Therefore, our proposed 5G-AKA’ protocol is better than the 5G AKA protocol, and these recently improved 5G AKA protocols in security.

5.2. Performance of the 5G-AKA’ Protocol

The comparative analysis between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24] in the number of messages, the number of fields, the amount of calculation and backward compatibility is shown in Table 3.
In Table 3, MN denotes the number of messages of the 5G AKA protocol. FN denotes the number of fields of the 5G AKA protocol. CA denotes the amount of calculation of the 5G AKA protocol. Note that the number of messages and the number of fields in Table 3 are the number of messages and the number of fields among the UE, the SN and the HN. ECDH denotes the generation and verification of an elliptic curve Diffie–Hellman (ECDH) exchange. PED denotes the encryption and decryption based on a public and private key pair. F denotes the generation and verification of a key function, a key derivation function, a MAC function or a hash function, which are grouped into one category because they have a similar amount of calculation [27]. According to [26], the computation overhead of the generation or verification of an ECDH exchange is 1290 us, the computation overhead of the encryption based on a public key is 2580 us, the computation overhead of the decryption based on a private key is 1750 us, the computation overhead of the hash function based on SHA-256 is 3.8 us, and the computation overhead of the MAC function based on HMAC-SHA256 is 67 us.
In our proposed 5G-AKA’ protocol, two messages related to M A C f are cut down because M A C f is replaced with a timeout mechanism on the HN. Four R A N D S N , one R A N D , and one S U P I are added to the messages between the SN and the HN, while two M A C f are cut down, so four fields are added. Since K is replaced with B K = K D F ( K , x y G | | S N N ) on the UE and the HN, the calculation amount of one F is added. From Table 3, compared with other protocols, our proposed 5G-AKA’ protocol reduces two messages. The 5G-AKA’ protocol adds more fields than the protocols in [23] and [24], but less than the protocol in [22]. In the amount of calculation, our proposed 5G-AKA’ protocol increases the least, while the protocols in [23] and [24] increase the most because they introduce multiple public-key encryption and decryption. Hence, our proposed 5G-AKA’ protocol is efficient. Especially for the UE, only a key derivation function is added, but one field and one message are reduced.
In addition, the protocols in [23] and [24] destroys the structure of the messages instead of adding fields to the messages or extending fields in the messages, so they are not backward compatible. Our proposed 5G-AKA’ protocol only extends K and adds some fields to the messages between the SN and the HN, so it is forward compatible.

6. Conclusions

In this paper, we summarize the 5G AKA protocol into three cases according to the overview of the latest version of the 5G AKA protocol and then use the mixed strand space model for mixed protocols to formally analyze the security of the 5G AKA protocol. As a result, twenty-one attack scenarios of the 5G AKA protocol are obtained, where thirteen attack scenarios are related to the MAC failure, including MAC failure attacks. Based on these attack scenarios, we find that the mutual authentication between the UE and the SN cannot be established, and only the weaker agreement can be established among the UE, the SN and the HN, resulting in MitM attacks and cross attacks. Further, by replaying some message to the UE and the SN, replay attacks and masquerading attacks can be performed, the location privacy of the UE can be compromised and DoS attacks on the SN can be formed. In addition, the 5G AKA protocol cannot provide perfect forward secrecy.
To overcome these attacks, we propose a 5G-AKA’ protocol, in which the pre-shared key between the UE and the HN is replaced with a derivation key of the pre-shared key, the challenge–response mechanism between the SN and the HN is added, the SUPI of the UE is added to the second message between the SN and the HN, and the MAC failure procedure is replaced with a timeout mechanism on the HN. According to the 5G-AKA’ protocol, we summarize the 5G-AKA’ protocol into two cases and then use the mixed strand space model for mixed protocols to formally analyze the security of the 5G-AKA’ protocol. As a result, no attack scenario is obtained.
By discussion and analysis, the 5G-AKA’ protocol can establish mutual authentication and injection agreement among the UE, the SN and the HN, and can overcome the above security problems of the latest version of the 5G AKA protocol. Therefore, the 5G-AKA’ protocol is secure. The comparative analysis of security properties between the 5G-AKA’ protocol and some recently improved 5G AKA protocols shows that the 5G-AKA’ protocol is better than these recently improved 5G AKA protocols in security. The comparative analysis between the 5G-AKA’ protocol and some recently improved 5G AKA protocols in the number of messages, the number of fields, the amount of calculation and backward compatibility shows that the 5G-AKA’ protocol is efficient, and is backward compatible with the 5G AKA protocol.
Recently, some authors also point out that the protection mechanism of SQN can be defeated due to its use of XOR in the 5G AKA protocol. This paper does not consider this security problem, and we will further study this security problem in the future.

Author Contributions

Methodology, Y.X.; formal analysis, S.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No.61741216, 61402367), Shaanxi Science and Technology Co-ordination & Innovation Project (No.2016KTTSGY01-03), National Key Research and Development Program (No. 2018YFC08242-04) and New Star Team Project of Xi’an University of Posts and Telecommunications.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

3GPP3rd generation partnership project
4G4th generation mobile communication technology
5G5th generation mobile communication technology
ABBAanti-bidding down between architectures
AKAauthentication and key agreement
AKMAauthentication and key management for applications
AMFauthentication management field
ARPFauthentication credential repository and processing function
AUSFauthentication server function
DoSdenial of service
EAP-AKA’improved extensible authentication protocol method for 3rd generation authentication and key agreement
EAP-TLSextensible authentication protocol method for transport layer security
ECDHelliptic curve Diffie–Hellman
EPSevolution packet system
HNhome network
ICBinitial counter block
LTElong-term evolution
MACmessage authentication code
MEmobile equipment
MitMman-in-the-middle attacks
PKIpublic key infrastructure
SEAFsecurity anchor function
SIDFsubscriber identity de-concealing function
SNserving network
SNNserving network name
SQNsequence number
SUCIsubscription concealed identifier
SUPIsubscription permanent identifier
TStechnical specification
UDMunified data management
UEuser equipment
USIMuniversal subscriber identity module
XORexclusive-or

Notations

A B B A the ABBA parameter
A K , A K * two anonymity keys
A K M A the AKMA indication and routing indicator
A M F the authentication management field
A M F 0 a dummy value of all zeros
A U T N an authentication token of the HN
A U T S a resynchronization parameter
B K a base key derived from K
CAthe amount of calculation of the 5G AKA protocol
C K a cipher key
ECDHthe generation and verification of an ECDH exchange
E K an encryption key
f 1 ( ) , f 1 ( ) , f 2 ( ) three message authentication functions
f 3 ( ) , f 4 ( ) , f 5 ( ) , f 5 ( ) four key generating functions
Fthe generation and verification of a key function or a key derivation function or a MAC function or a hash function
FNthe number of fields (among the UE, the SN and the HN) of the 5G AKA protocol
H M A C ( ) a hash function for computing MAC
H 1 , H 2 , H 3 , H 4 four messages that are not inspected by the SN
H N the HN
H R E S * a hashing response from R E S *
H X R E S * a hashing expected response from X R E S *
I C B an initial counter block
I K an integrity key
K a long-term key between the UE and the HN
K A M F a key between the UE and the access and mobility management function
K A U S F a key derived from C K and I K
K P the key set of the penetrator
K S E A F a key derived from K A U S F
K S N , H N the session key between the SN and the HN
K D F ( ) a key derivation function
M A C a MAC of the HN
M A C f the “MAC failure” indication
M A C U E a MAC of the UE
M K a MAC key
MNthe number of messages (among the UE, the SN and the HN) of the 5G AKA protocol
n g K S I identifying the K A M F and the partial native security context
PEDthe encryption and decryption based on a public and private key pair
R A N D an unpredictable challenge of the HN
R A N D S N , r S E A F two unpredictable challenges of the SEAF
R E S a response
R E S * a response from R E S
R e s u l t the authentication result
r U E an unpredictable challenge of the UE
S H A 256 ( ) a hash function
S N the SN
S N N the serving network name of the SN
S Q N a fresh sequence number generated by the HN
S Q N U E the highest sequence number the USIM has accepted
S U C I a SUCI of the UE
S U P I a SUPI of the UE
S y n c f the “Synchronization failure” indication
U E the UE
x an ephemeral private key of the UE for Diffie-Hellman exchange
x G an ephemeral public key of the UE for Diffie-Hellman exchange
X M A C a MAC locally computed by the UE
X R E S an expected response
X R E S * an expected response from X R E S
y an ephemeral private key of the HN for Diffie-Hellman exchange
y G an ephemeral public key of the HN for Diffie-Hellman exchange

References

  1. Xu, S.; Gan, Z. Review and trends of 5G security technology. Radio Commun. Technol. 2020, 46, 133–138. [Google Scholar]
  2. 3GPP TS 33.102: 3G Security; Security Architecture. Available online: https://www.3gpp.org/DynaReport/33102.htm (accessed on 26 January 2022).
  3. 3GPP TS 33.401: 3GPP System Architecture Evolution (SAE); Security Architecture. Available online: https://www.3gpp.org/DynaReport/33401.htm (accessed on 26 January 2022).
  4. 3GPP TS 33.501: 3GPP System Architecture Evolution (SAE); Security Architecture. Available online: https://www.3gpp.org/DynaReport/33501.htm (accessed on 26 January 2022).
  5. Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmano, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef] [Green Version]
  6. Jover, R.P.; Marojevic, V. Security and protocol exploit analysis of the 5G specifications. IEEE Access 2019, 7, 24956–24963. [Google Scholar] [CrossRef]
  7. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutor. 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  8. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor. 2019, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
  9. Hussain, S.R.; Echeverria, M.; Karim, I.; Chowdhury, O.; Berino, E. 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 669–684. [Google Scholar]
  10. Hussain, S.R.; Echeverria, M.; Chowdhury, O.; Li, N.; Bertino, E. Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019; pp. 1–15. [Google Scholar]
  11. Khan, H.; Martin, K.M. A survey of subscription privacy on the 5G radio interface-the past, present and future. J. Informat. Secur. Appl. 2020, 53, 102537. [Google Scholar] [CrossRef]
  12. Security Vulnerability in 5G-AKA Draft. Available online: https://www.cs.ox.ac.uk/5G-analysis/5G-AKA-draft-vulnerability.pdf (accessed on 23 February 2022).
  13. Meier, S.; Schmidt, B.; Cremers, C.; Basin, D. The Tamarin prover for the symbolic analysis of security protocols. In Proceedings of the 25th International Conference on Computer Aided Verification, Saint Petersburg, Russia, 13–19 July 2013; pp. 696–701. [Google Scholar]
  14. Basin, D.; Dreier, J.; Hirschi, L.; Radomirovic, S.; Sasse, R.; Stettler, V. A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 15–19 October 2018; pp. 1383–1396. [Google Scholar]
  15. Liu, F.; Peng, J.; Zuo, M. Toward a secure access to 5G network. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1121–1128. [Google Scholar]
  16. Borgaonkar, R.; Hirschi, L.; Park, S.; Shaik, A. New privacy threat on 3G, 4G, and upcoming 5G AKA Protocols. Proc. Priv. Enhancing Technol. 2019, 3, 108–127. [Google Scholar] [CrossRef] [Green Version]
  17. Cremers, C.; Dehnel-Wild, M. Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019; pp. 1–15. [Google Scholar]
  18. Koutsos, A. The 5G-AKA authentication protocol privacy. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS & P), Stockholm, Sweden, 17–19 June 2019; pp. 464–479. [Google Scholar]
  19. Bana, G.; Comon-Lundh, H. Towards unconditional soundness: Computationally complete symbolic attacker. In Proceedings of the First International Conference on Principles of Security and Trust (ETAPS), Tallinn, Estonia, 24 March–1 April 2012; pp. 189–208. [Google Scholar]
  20. Bana, G.; Comon-Lundh, H. A computationally complete symbolic attacker for equivalence properties. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 609–620. [Google Scholar]
  21. Braeken, A.; Liyanage, M.; Kumar, P.; Murphy, J. Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 2019, 7, 64040–64052. [Google Scholar] [CrossRef]
  22. Gharsallah, I.; Smaoui, S.; Zarai, F. A secure efficient and lightweight authentication protocol for 5G cellular networks: SEL-AKA. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1311–1316. [Google Scholar]
  23. Hu, X.; Liu, C.; Liu, S.; Cheng, X. A security enhanced 5G authentication scheme for insecure channel. IEICE Trans. Inf. Syst. 2020, 103, 711–713. [Google Scholar] [CrossRef] [Green Version]
  24. Hu, X.; Liu, C.; Liu, S.; Li, J.; Cheng, X. A vulnerability in 5G authentication protocols and its Countermeasure. IEICE Trans. Inf. Syst. 2020, 103, 1806–1809. [Google Scholar] [CrossRef]
  25. Edris, E.K.K.; Aiash, M.; Loo, J.K. Formal verification and analysis of primary authentication based on 5G-AKA protocol. In Proceedings of the 2020 7th International Conference on Software Defined Systems (SDS), Paris, France, 20–23 April 2020; pp. 256–261. [Google Scholar]
  26. Ouaissa, M.; Ouaissa, M. An improved privacy authentication protocol for 5G mobile networks. In Proceedings of the 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), Dehradun, India, 21–22 August 2020; pp. 136–143. [Google Scholar]
  27. Parne, B.L.; Gupta, S.; Gandhi, K.; Meena, S. PPSE: Privacy preservation and security efficient AKA protocol for 5G communication networks. In Proceedings of the 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), New Delhi, India, 14–17 December 2020; pp. 1–6. [Google Scholar]
  28. Fábrega, F.J.T.; Herzog, J.C.; Guttman, J.D. Mixed strand spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, 30–30 June 1999; pp. 72–82. [Google Scholar]
  29. Fábrega, F.J.T.; Herzog, J.C.; Guttman, J.D. Strand space: Proving security protocols correct. J. Comput. Secur. 1999, 7, 191–230. [Google Scholar] [CrossRef]
  30. Herzog, J.C. The Diffie-Hellman key-agreement scheme in the strand-space model. In Proceedings of the 16th IEEE Computer Security Foundation Workshop, Pacific Grove, CA, USA, 30 June–2 July 2003; pp. 234–247. [Google Scholar]
Figure 1. The steps of the latest version of the 5G AKA protocol. In the following notations, various fields in the figures have been described, including these fields marked with *. In detail, X R E S is an expected response, while X R E S * is an expected response from X R E S , then H X R E S * is a hashing expected response from X R E S * . R E S is response, while R E S * is a response from R E S .
Figure 1. The steps of the latest version of the 5G AKA protocol. In the following notations, various fields in the figures have been described, including these fields marked with *. In detail, X R E S is an expected response, while X R E S * is an expected response from X R E S , then H X R E S * is a hashing expected response from X R E S * . R E S is response, while R E S * is a response from R E S .
Electronics 11 01333 g001
Figure 2. The first attack scenario of the 5G AKA protocol.
Figure 2. The first attack scenario of the 5G AKA protocol.
Electronics 11 01333 g002
Figure 3. The second attack scenario of the 5G AKA protocol.
Figure 3. The second attack scenario of the 5G AKA protocol.
Electronics 11 01333 g003
Figure 4. The third attack scenario of the 5G AKA protocol.
Figure 4. The third attack scenario of the 5G AKA protocol.
Electronics 11 01333 g004
Figure 5. The fourth attack scenario of the 5G AKA protocol.
Figure 5. The fourth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g005
Figure 6. The fifth attack scenario of the 5G AKA protocol.
Figure 6. The fifth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g006
Figure 7. The sixth attack scenario of the 5G AKA protocol.
Figure 7. The sixth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g007
Figure 8. The seventh attack scenario of the 5G AKA protocol.
Figure 8. The seventh attack scenario of the 5G AKA protocol.
Electronics 11 01333 g008
Figure 9. The eighth attack scenario of the 5G AKA protocol.
Figure 9. The eighth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g009
Figure 10. The ninth attack scenario of the 5G AKA protocol.
Figure 10. The ninth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g010
Figure 11. The tenth attack scenario of the 5G AKA protocol.
Figure 11. The tenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g011
Figure 12. The eleventh attack scenario of the 5G AKA protocol.
Figure 12. The eleventh attack scenario of the 5G AKA protocol.
Electronics 11 01333 g012
Figure 13. The twelfth attack scenario of the 5G AKA protocol.
Figure 13. The twelfth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g013
Figure 14. The thirteenth attack scenario of the 5G AKA protocol.
Figure 14. The thirteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g014
Figure 15. The fourteenth attack scenario of the 5G AKA protocol.
Figure 15. The fourteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g015
Figure 16. The fifteenth attack scenario of the 5G AKA protocol.
Figure 16. The fifteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g016
Figure 17. The sixteenth attack scenario of the 5G AKA protocol.
Figure 17. The sixteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g017
Figure 18. The seventeenth attack scenario of the 5G AKA protocol.
Figure 18. The seventeenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g018
Figure 19. The eighteenth attack scenario of the 5G AKA protocol.
Figure 19. The eighteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g019
Figure 20. The nineteenth attack scenario of the 5G AKA protocol.
Figure 20. The nineteenth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g020
Figure 21. The twentieth attack scenario of the 5G AKA protocol.
Figure 21. The twentieth attack scenario of the 5G AKA protocol.
Electronics 11 01333 g021
Figure 22. The twenty-first attack scenario of the 5G AKA protocol.
Figure 22. The twenty-first attack scenario of the 5G AKA protocol.
Electronics 11 01333 g022
Figure 23. Our proposed 5G-AKA’ protocol.
Figure 23. Our proposed 5G-AKA’ protocol.
Electronics 11 01333 g023
Table 1. The comparative analysis of authentication properties between the two protocols.
Table 1. The comparative analysis of authentication properties between the two protocols.
ProtocolsAuthentication PropertiesUE to SNUE to HNSN to UESN to HNHN to UEHN to SN
5G AKAInjection agreementNoNoNoNoNoNo
Non-injection agreementNoNoNoNoNoNo
Weaker agreementNoYesNoYesYesYes
5G-AKA’Injection agreementYesYesYesYesYesYes
Non-injection agreementNoNoNoNoNoNo
Weaker agreementNoNoNoNoNoNo
Table 2. The comparative analysis of security properties between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24].
Table 2. The comparative analysis of security properties between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24].
Security Properties5G AKA[22][23][24]5G-AKA’
Implement mutual authenticationNoNoNoNoYes
Prevent MitM attacksNoNoNoNoYes
Resistance against cross attacksNoNoNoYesYes
Compromise the location privacy of the UENoYesYesYesYes
Prevent masquerading attacksNoNoNoNoYes
Resistance against replay attacksNoNoNoNoYes
Defend against DoS attacks on the SNNoNoNoNoYes
Prevent MAC failure attacksNoNoNoYesYes
Provide key secrecyYesYesYesYesYes
Provide perfect forward secrecyNoNoNoNoYes
Table 3. The comparative analysis between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24] in the number of messages, the number of fields, the amount of calculation and backward compatibility.
Table 3. The comparative analysis between the 5G-AKA’ protocol and some recently improved 5G AKA protocols [22,23,24] in the number of messages, the number of fields, the amount of calculation and backward compatibility.
Comparative Items5G AKA[22][23][24]5G-AKA’
The number of messagesMNMNMNMNMN-2
The number of fieldsFNFN + 9FN-1FN + 2FN + 4
The amount of calculationCACA + 2FCA + 4PED-1ECDH-2FCA + 2PED + 1FCA + 1F
Backward compatibility--YesNoNoYes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xiao, Y.; Gao, S. Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model. Electronics 2022, 11, 1333. https://doi.org/10.3390/electronics11091333

AMA Style

Xiao Y, Gao S. Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model. Electronics. 2022; 11(9):1333. https://doi.org/10.3390/electronics11091333

Chicago/Turabian Style

Xiao, Yuelei, and Shan Gao. 2022. "Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model" Electronics 11, no. 9: 1333. https://doi.org/10.3390/electronics11091333

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop