2019
DOI: 10.1109/access.2019.2914941
|View full text |Cite
|
Sign up to set email alerts
|

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks

Abstract: The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next generation of mobile communications. It has been recently shown that the current version of this protocol still contains several weaknesses regarding user localization, leakage of activity, active attackers, and in the presence of malicious serving networks, leadi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 75 publications
(46 citation statements)
references
References 26 publications
0
44
0
Order By: Relevance
“…As a result, a new generation of security services has to be offered [58]. Novel 5G AKA, USIM and ECC based design of handoff authentication for 5G-WLAN HetNets will be needed that can extend the provisions of secure and seamless internet connectivity [59]. Many of these additional requirements come from the technology shift to SDN [55] and NF virtualization (NFV) [42], network slicing, massive MIMO [33], NOMA [60], ultra-dense small cell network [40], D2D and M2M communications, and the cloud, and they lead to the need of increased security on the network side.…”
Section: Security Challengesmentioning
confidence: 99%
“…As a result, a new generation of security services has to be offered [58]. Novel 5G AKA, USIM and ECC based design of handoff authentication for 5G-WLAN HetNets will be needed that can extend the provisions of secure and seamless internet connectivity [59]. Many of these additional requirements come from the technology shift to SDN [55] and NF virtualization (NFV) [42], network slicing, massive MIMO [33], NOMA [60], ultra-dense small cell network [40], D2D and M2M communications, and the cloud, and they lead to the need of increased security on the network side.…”
Section: Security Challengesmentioning
confidence: 99%
“…Despite the evolutions to the AKA protocol made in each generation, the nutshell of the AAC mechanism stays the same and is based on symmetric cryptography and a secret key shared between the UE and the HN [36]. In 3G and 4G, the identity of the UE (IMSI) is sent in a clear text in the identity request part of the AKA protocol, which allows privacy attacks against the UE [37][38][39][40][41][42][43][44][45][46][47][48]. To address this problem, in 5G, the UE sends its identity protected by asymmetric encryption using the HN's public key.…”
Section: Aka-based Aac Flawsmentioning
confidence: 99%
“…The security flaws of the AKA-based AAC mechanism used in cellular networks, the different attacks against them and their formal security analysis were studied in several pieces of research [38][39][40][41][42][43]. If we focus on 5G-AKA as the main AAC mechanism in 5G, we can see that although it is not in the operational stage yet, some security flaws have already been recognized.…”
Section: Aka-based Aac Flawsmentioning
confidence: 99%
See 2 more Smart Citations