Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks

Files in This Item:
File Description SizeFormat 
IEEE_Access___New_5G_Authentication_Protocol (17).pdf2.03 MBAdobe PDFDownload
Title: Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
Authors: Braeken, AnLiyanage, MadhusankaKumar, PardeepMurphy, John
Permanent link:
Date: 6-May-2019
Online since: 2019-10-23T15:31:47Z
Abstract: The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has standardized the 5G AKA (Authentication and Key Agreement) protocol for the next generation of mobile communications. It has been recently shown that the current version of this protocol still contains several weaknesses regarding user localization, leakage of activity, active attackers, and in the presence of malicious serving networks, leading to potentially major security leaks. We propose a new version of the 5G AKA protocol to overcome all the currently identified weaknesses in the protocol. In the new protocol, we replace the sequence numbers with random numbers, making it possible to drastically reduce the number of required communication phases and steps in the protocol. The usage of random numbers for the 5G AKA protocol is possible since the current Universal Subscriber Identity Modules (USIMs) are now capable of performing randomized asymmetric encryption operations. Moreover, the proposed protocol provides two additional security features, i.e., post-compromise security and forward security, not present in the current 5G AKA protocol. Finally, we evaluate the performance, both computation and communication efficiency, of the proposed AKA protocol and show its improvements compared to the current 5G AKA protocol.
Funding Details: European Commission
University College Dublin
metadata.dc.description.othersponsorship: Project and Academy of Finland
COST Action
Type of material: Journal Article
Publisher: IEEE
Journal: IEEE Access
Volume: 7
Start page: 64040
End page: 64052
Copyright (published version): 2019 IEEE
Keywords: 5GAuthenticationKey agreementSecurityMobile communicationFormal verification
DOI: 10.1109/ACCESS.2019.2914941
Language: en
Status of Item: Peer reviewed
Appears in Collections:Computer Science Research Collection

Show full item record

Citations 50

Last Week
Last month
checked on Jan 24, 2020

Page view(s)

Last Week
Last month
checked on Jan 28, 2020


checked on Jan 28, 2020

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.