A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain

被引:4
作者
Yadav, Awaneesh Kumar [1 ]
Braeken, An [2 ]
Misra, Manoj [3 ,4 ]
Liyange, Madhusanka
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[2] Vrije Univ Brussel, Dept Engn Technol INDI, Brussels, Belgium
[3] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[4] Univ Oulu, CWC, Oulu, Finland
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
5G-AKA; Authentication; ECC; Cloud Computing; Internet of Things (IoT); ROR logic; Network Security; KEY AGREEMENT PROTOCOL; EXCHANGE;
D O I
10.1109/CCNC51644.2023.10059918
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5GAKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA has numerous shortcomings such as perfect forward secrecy violation, malicious Serving Network (SN), de-synchronization attack, privacy theft, stolen device, and denial of Service (DoS) attacks when the user uses the roaming mobile services. Considering the shortcomings of existing protocols and the requirement to offer increased security, we propose a provable secure, efficient 5G-AKA authentication protocol using the blockchain. The security features of the proposed protocol are examined using the Real-Or-Random (ROR) logic and Scyther tool. Furthermore, the performance of the proposed protocol is evaluated, which shows that it is the least costly compared to its counterparts in terms of computational and communication costs. In addition, the comparison of the Ethereum blockchain depicts that the proposed protocol takes less transaction and execution costs compared to its counterparts.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Provably secure fog-based authentication protocol for VANETs [J].
Awais, Syed Muhammad ;
Yucheng, Wu ;
Mahmood, Khalid ;
Badar, Hafiz Muhammad Sanaullah ;
Kharel, Rupak ;
Das, Ashok Kumar .
COMPUTER NETWORKS, 2024, 246
[32]   A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN [J].
Gupta, Ankur ;
Tripathi, Meenakshi ;
Sharma, Aakar .
COMPUTER COMMUNICATIONS, 2020, 160 :311-325
[33]   A provably secure anonymous authentication scheme for Session Initiation Protocol [J].
Chaudhry, Shehzad Ashraf ;
Khan, Imran ;
Irshad, Azeem ;
Ashraf, Muhammad Usman ;
Khan, Muhammad Khurram ;
Ahmad, Hafiz Farooq .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5016-5027
[34]   A provably secure group authentication protocol for various LTE networks [J].
Kijjabuncha, Boriphat ;
Hiranvanichakorn, Pipat .
International Journal of Network Security, 2019, 21 (06) :957-970
[35]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Shehzad Ashraf Chaudhry ;
Husnain Naqvi ;
Muhammad Sher ;
Mohammad Sabzinejad Farash ;
Mahmood Ul Hassan .
Peer-to-Peer Networking and Applications, 2017, 10 :1-15
[36]   Provably Secure Pseudonyms based Authentication Protocol for Wearable Ubiquitous Computing Environment [J].
Nyangaresi, Vincent Omollo .
2022 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES, ICICT 2022, 2022, :1-6
[37]   An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things [J].
Rafique, Farva ;
Obaidat, Mohammad S. ;
Mahmood, Khalid ;
Ayub, Muhammad Faizan ;
Ferzund, Javed ;
Chaudhry, Shehzad Ashraf .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) :8039-8046
[38]   Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain [J].
Benrebbouh, Chahrazed ;
Mansouri, Houssem ;
Cherbal, Sarra ;
Pathan, Al-Sakib Khan .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) :68-88
[39]   Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain [J].
Chahrazed Benrebbouh ;
Houssem Mansouri ;
Sarra Cherbal ;
Al-Sakib Khan Pathan .
Peer-to-Peer Networking and Applications, 2024, 17 :68-88
[40]   Provably secure RSA-based remote user authentication protocol using passwords [J].
Wang, Ding ;
Wang, Ping ;
Li, Zeng-Peng ;
Ma, Chun-Guang .
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01) :191-204