Skip to main content
Erschienen in: The Journal of Supercomputing 4/2023

15.09.2022

Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

verfasst von: Sudip Kumar Palit, Mohuya Chakraborty, Subhalaxmi Chakraborty

Erschienen in: The Journal of Supercomputing | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we have proposed a lightweight mutual authentication and key agreement scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed 5GMAKA protocol has been implemented to overcome the problem associated with the 5G authentication and key agreement (5G AKA) protocol suggested by the 3rd generation partnership project (3GPP). 5G AKA is exposed to various sorts of fatal network security attacks and takes excessive time to execute (\(\sim ~685.62\,{\rm milliseconds}\)) compared to other related authentication and key agreement schemes as per the literature survey. The stability and robustness of the proposed 5GMAKA under safety issues are ensured by the results obtained from the security analysis of the scheme using the well-known rubin logic and automatic validation of internet security protocol applications (AVISPA) simulation tool. The performance analysis of the proposed 5GMAKA shows that this scheme is superior compared to 5G AKA of 3GPP and other standard protocols with respect to enhanced security features, five communication rounds, and shorter execution time (\(\sim 0.72\,{\rm milliseconds}\)) which is the lowest among all other related schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151 Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151
7.
8.
Zurück zum Zitat Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://doi.org/10.1145/2382196.2382221 Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://​doi.​org/​10.​1145/​2382196.​2382221
9.
Zurück zum Zitat Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275 Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275
10.
Zurück zum Zitat Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_56 Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-319-07782-6_​56
15.
Zurück zum Zitat Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220CrossRef Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220CrossRef
16.
Zurück zum Zitat Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296CrossRef Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296CrossRef
17.
Zurück zum Zitat Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125CrossRef
18.
Zurück zum Zitat Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118CrossRef
19.
Zurück zum Zitat Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465CrossRef
20.
Zurück zum Zitat Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110 Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
21.
Zurück zum Zitat Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565CrossRef
22.
Zurück zum Zitat Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126) Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126)
23.
Zurück zum Zitat Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271CrossRef
24.
Zurück zum Zitat Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441CrossRef
25.
Zurück zum Zitat Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://doi.org/10.1007/978-981-15-0361-0_14 Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://​doi.​org/​10.​1007/​978-981-15-0361-0_​14
26.
Zurück zum Zitat Palit SK, Chakraborty M, Chakraborty S (2022). MASKA: mutual authentication and session key agreement protocol in global mobility networks. In: Applications of machine intelligence in engineering. 309–321. CRC Press. https://doi.org/10.1201/9781003269793 Palit SK, Chakraborty M, Chakraborty S (2022). MASKA: mutual authentication and session key agreement protocol in global mobility networks. In: Applications of machine intelligence in engineering. 309–321. CRC Press. https://​doi.​org/​10.​1201/​9781003269793
31.
Zurück zum Zitat Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127CrossRef Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127CrossRef
33.
Zurück zum Zitat Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://doi.org/10.1145/3243734.3243846 Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://​doi.​org/​10.​1145/​3243734.​3243846
42.
Zurück zum Zitat Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56 Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56
43.
Zurück zum Zitat Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031CrossRef Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031CrossRef
47.
Zurück zum Zitat Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208CrossRefMATH Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208CrossRefMATH
48.
Zurück zum Zitat Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116CrossRef Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116CrossRef
50.
Zurück zum Zitat Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17 Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17
Metadaten
Titel
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network
verfasst von
Sudip Kumar Palit
Mohuya Chakraborty
Subhalaxmi Chakraborty
Publikationsdatum
15.09.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 4/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-04807-7

Weitere Artikel der Ausgabe 4/2023

The Journal of Supercomputing 4/2023 Zur Ausgabe

Premium Partner