Abstract
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the latest version of the 5G AKA protocol, the main improvements include that the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key as the pre-shared key, the challenge-–response mechanism for the serving network (SN) is added, the mutual authentication and key confirmation occurs between the UE and the SN, and the message authentication code (MAC) failure procedure is replaced with a timeout mechanism on the HN. Then, the 5G-IPAKA protocol is proven secure in the mixed strand space model for mixed protocols. Further discussion and comparative analysis show that the 5G-IPAKA protocol can overcome the above shortcomings of the latest version of the 5G AKA protocol, and is better than the recently improved 5G AKA protocols. Additionally, the 5G-IPAKA protocol is efficient and backward-compatible.
Funder
National Natural Science Foundation of China
Shaanxi Science and Technology Co-ordination & Innovation Project
National Key Research and Development Program
Reference30 articles.
1. Review and trends of 5G security technology;Xu;Radio Commun. Technol.,2020
2. 3GPP TS 33.102: 3G Security. Security Architecturehttps://www.3gpp.org/DynaReport/33102.htm
3. 3GPP TS 33.401: 3GPP System Architecture Evolution (SAE). Security Architecturehttps://www.3gpp.org/DynaReport/33401.htm
4. 3GPP TS 33.501: 3GPP System Architecture Evolution (SAE). Security Architecturehttps://www.3gpp.org/DynaReport/33501.htm
5. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献