A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain

被引:4
作者
Yadav, Awaneesh Kumar [1 ]
Braeken, An [2 ]
Misra, Manoj [3 ,4 ]
Liyange, Madhusanka
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[2] Vrije Univ Brussel, Dept Engn Technol INDI, Brussels, Belgium
[3] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[4] Univ Oulu, CWC, Oulu, Finland
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
5G-AKA; Authentication; ECC; Cloud Computing; Internet of Things (IoT); ROR logic; Network Security; KEY AGREEMENT PROTOCOL; EXCHANGE;
D O I
10.1109/CCNC51644.2023.10059918
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5GAKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA has numerous shortcomings such as perfect forward secrecy violation, malicious Serving Network (SN), de-synchronization attack, privacy theft, stolen device, and denial of Service (DoS) attacks when the user uses the roaming mobile services. Considering the shortcomings of existing protocols and the requirement to offer increased security, we propose a provable secure, efficient 5G-AKA authentication protocol using the blockchain. The security features of the proposed protocol are examined using the Real-Or-Random (ROR) logic and Scyther tool. Furthermore, the performance of the proposed protocol is evaluated, which shows that it is the least costly compared to its counterparts in terms of computational and communication costs. In addition, the comparison of the Ethereum blockchain depicts that the proposed protocol takes less transaction and execution costs compared to its counterparts.
引用
收藏
页数:6
相关论文
共 50 条
[21]   Secure-AKA: An Efficient AKA Protocol for UMTS Networks [J].
Saxena, Neetesh ;
Chaudhari, Narendra S. .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (02) :1345-1373
[22]   ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks [J].
Saxena, Neetesh ;
Thomas, Jaya ;
Chaudhari, Narendra S. .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) :1981-2012
[23]   Secure and effective authentication for 5G networks (SEA-5G) using blockchain [J].
R. Bala ;
R. Manoharan .
Journal of Ambient Intelligence and Humanized Computing, 2025, 16 (1) :51-66
[24]   Secure and efficient mutual authentication protocol for smart grid under blockchain [J].
Wang, Weizheng ;
Huang, Huakun ;
Zhang, Lejun ;
Su, Chunhua .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) :2681-2693
[25]   Secure and efficient mutual authentication protocol for smart grid under blockchain [J].
Weizheng Wang ;
Huakun Huang ;
Lejun Zhang ;
Chunhua Su .
Peer-to-Peer Networking and Applications, 2021, 14 :2681-2693
[26]   Provably secure anonymous authentication key agreement protocol for multicast group [J].
Feng T. ;
Liu Y.-Y. ;
Ma J.-F. .
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02) :273-277
[27]   Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment [J].
Barman, Subhas ;
Das, Ashok Kumar ;
Samanta, Debasis ;
Chattopadhyay, Samiran ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2018, 6 :38578-38594
[28]   BC-AKA: Blockchain based asymmetric authentication and key agreement protocol for distributed 5G core network [J].
Gao, Zhen ;
Zhang, Dongbin ;
Zhang, Jiuzhi ;
Liu, Zhao ;
Liu, Haoming ;
Zhao, Ming .
CHINA COMMUNICATIONS, 2022, 19 (06) :66-76
[29]   SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks [J].
Hong, Hsiang-Jen ;
Chang, Sang-Yoon ;
Fan, Wenjun ;
Wuthier, Simeon ;
Zhou, Xiaobo .
PROCEEDINGS OF THE 27TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS, ICIN, 2024, :114-121
[30]   Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User [J].
Moon, Jongho ;
Lee, Youngsook ;
Kim, Jiye ;
Won, Dongho .
SECURITY AND COMMUNICATION NETWORKS, 2017,