Formal verification of secondary authentication protocol for 5G secondary authentication

被引:2
|
作者
Edris E.K.K. [1 ]
Aiash M. [1 ]
Loo J.K.-K. [2 ]
Alhakeem M.S. [3 ]
机构
[1] School of Science and Technology, Middlesex University, London
[2] School of Computer and Engineering, University of West London, London
[3] Naif Arab University for Security Sciences, Riyadh
来源
International Journal of Security and Networks | 2021年 / 16卷 / 04期
关键词
5G; Applied Pi calculus; Formal methods; ProVerif; Secondary authentication; Security protocol; Services;
D O I
10.1504/IJSN.2021.119379
中图分类号
学科分类号
摘要
The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol’s security properties. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:223 / 234
页数:11
相关论文
共 30 条
  • [21] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    Array, 2022, 16
  • [22] Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques
    Ko, Yongho
    Pawana, I Wayan Adi Juliawan
    You, Ilsun
    Sensors, 2024, 24 (24)
  • [23] TESLA Source Authentication Protocol Verification Experiment in the Timed OTS/CafeOBJ Method: Experiences and Lessons Learned
    Ouranos, Iakovos
    Ogata, Kazuhiro
    Stefaneas, Petros
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (05): : 1160 - 1170
  • [24] Toward an Era of Secure 5G Convergence Applications: Formal Security Verification of 3GPP AKMA with TLS 1.3 PSK Option
    Ko, Yongho
    Pawana, I. Wayan Adi Juliawan
    Won, Taeho
    Astillo, Philip Virgil
    You, Ilsun
    APPLIED SCIENCES-BASEL, 2024, 14 (23):
  • [25] Network Service Federated Identity (NS-FId) Protocol for Service Authorization in 5G Network
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Loo, Jonathan Kok-Keng
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 128 - 135
  • [26] 5G wireless P2MP backhaul security protocol: an adaptive approach
    Jiyoon Kim
    Gaurav Choudhary
    Jaejun Heo
    Daniel Gerbi Duguma
    Ilsun You
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [27] 5G wireless P2MP backhaul security protocol: an adaptive approach
    Kim, Jiyoon
    Choudhary, Gaurav
    Heo, Jaejun
    Duguma, Daniel Gerbi
    You, Ilsun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [28] Formal-Guided Fuzz Testing: Targeting Security Assurance From Specification to Implementation for 5G and Beyond
    Yang, Jingda
    Arya, Sudhanshu
    Wang, Ying
    IEEE ACCESS, 2024, 12 : 29175 - 29193
  • [29] A security protocol for D2D communications in 5G networks using elliptic curve cryptography
    Kishore, R.
    Ioannou, I.
    Christophorou, C.
    Prabagarane, N.
    Vassiliou, V.
    Vignesh, S.
    Vinayak, H.
    Venkatesh, S.
    Pitsillides, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1389 - 1408
  • [30] A security protocol for D2D communications in 5G networks using elliptic curve cryptography
    R. Kishore
    I. Ioannou
    C. Christophorou
    N. Prabagarane
    V. Vassiliou
    S. Vignesh
    H. Vinayak
    S. Venkatesh
    A. Pitsillides
    International Journal of Information Security, 2022, 21 : 1389 - 1408