Formal verification of secondary authentication protocol for 5G secondary authentication

被引:2
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J.K.-K. [2 ]
Alhakeem M.S. [3 ]
机构
[1] School of Science and Technology, Middlesex University, London
[2] School of Computer and Engineering, University of West London, London
[3] Naif Arab University for Security Sciences, Riyadh
来源
International Journal of Security and Networks | 2021年 / 16卷 / 04期
关键词
5G; Applied Pi calculus; Formal methods; ProVerif; Secondary authentication; Security protocol; Services;
D O I
10.1504/IJSN.2021.119379
中图分类号
学科分类号
摘要
The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol’s security properties. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:223 / 234
页数:11
相关论文
共 30 条
  • [1] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [2] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [3] Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
    Zhang, Jingjing
    Yang, Lin
    Cao, Weipeng
    Wang, Qiang
    IEEE ACCESS, 2020, 8 : 23674 - 23688
  • [4] A secondary authentication algorithm of 5G communication with PUF terminal for power service
    Shao, Weiping
    Li, Yong
    Qiu, Jinyi
    Wang, Meiying
    2024 3RD INTERNATIONAL CONFERENCE ON ENERGY AND ELECTRICAL POWER SYSTEMS, ICEEPS 2024, 2024, : 1287 - 1290
  • [5] An SM9-Based Secondary Authentication Framework for 5G Technology
    Wang, Rui
    Liu, Xin
    Liu, Donglan
    Zhang, Hao
    Ma, Lei
    Wang, Yong
    Liu, Han
    Chen, Jianfei
    Li, Zhenghao
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (06)
  • [6] Formal Verification of 5G EAP-AKA protocol
    Ajit, Megha
    Sankaran, Sriram
    Jain, Kurunandan
    2021 31ST INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2021, : 140 - 146
  • [7] Authentication mechanisms in the 5G system
    Huang X.
    Yoshizawa T.
    Baskaran S.B.M.
    Journal of ICT Standardization, 2021, 9 (02): : 61 - 78
  • [8] Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Loo, Jonathan
    ELECTRONICS, 2021, 10 (13)
  • [9] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609
  • [10] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Bae Woo-Sik
    Wireless Personal Communications, 2014, 79 : 2595 - 2609