A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain

被引:4
作者
Yadav, Awaneesh Kumar [1 ]
Braeken, An [2 ]
Misra, Manoj [3 ,4 ]
Liyange, Madhusanka
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[2] Vrije Univ Brussel, Dept Engn Technol INDI, Brussels, Belgium
[3] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[4] Univ Oulu, CWC, Oulu, Finland
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
5G-AKA; Authentication; ECC; Cloud Computing; Internet of Things (IoT); ROR logic; Network Security; KEY AGREEMENT PROTOCOL; EXCHANGE;
D O I
10.1109/CCNC51644.2023.10059918
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5GAKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA has numerous shortcomings such as perfect forward secrecy violation, malicious Serving Network (SN), de-synchronization attack, privacy theft, stolen device, and denial of Service (DoS) attacks when the user uses the roaming mobile services. Considering the shortcomings of existing protocols and the requirement to offer increased security, we propose a provable secure, efficient 5G-AKA authentication protocol using the blockchain. The security features of the proposed protocol are examined using the Real-Or-Random (ROR) logic and Scyther tool. Furthermore, the performance of the proposed protocol is evaluated, which shows that it is the least costly compared to its counterparts in terms of computational and communication costs. In addition, the comparison of the Ethereum blockchain depicts that the proposed protocol takes less transaction and execution costs compared to its counterparts.
引用
收藏
页数:6
相关论文
共 50 条
[41]   Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach [J].
Shahidinejad, Ali ;
Abawajy, Jemal .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09) :15241-15251
[42]   Efficient and Secure Modified Cocktail-AKA Protocol for UMTS Network [J].
Parne, Balu L. ;
Gupta, Shubham ;
Chaudhari, Narendra S. .
2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, :167-172
[43]   Device-to-device group authentication compatible with 5G AKA protocol [J].
Braeken, An .
COMPUTER NETWORKS, 2021, 201
[44]   Efficient and provably secure IP multimedia subsystem authentication for UMTS [J].
Huang, Chung-Ming ;
Li, Jian-Wei .
COMPUTER JOURNAL, 2007, 50 (06) :739-757
[45]   A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier [J].
Patel, Khushboo A. ;
Shukla, Shivangi ;
Patel, Sankita J. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02)
[46]   A Secure and Efficient Deniable Authentication Protocol [J].
Xin Xiangjun ;
Chen Dongsheng .
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, :172-175
[47]   A provably secure lightweight authentication protocol in mobile edge computing environments [J].
Tsu-Yang Wu ;
Qian Meng ;
Lei Yang ;
Xinglan Guo ;
Saru Kumari .
The Journal of Supercomputing, 2022, 78 :13893-13914
[48]   Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles [J].
Nyangaresi, Vincent Omollo .
HIGH-CONFIDENCE COMPUTING, 2023, 3 (04)
[49]   A provably secure lightweight authentication protocol in mobile edge computing environments [J].
Wu, Tsu-Yang ;
Meng, Qian ;
Yang, Lei ;
Guo, Xinglan ;
Kumari, Saru .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (12) :13893-13914
[50]   Design of Provably Secure and Lightweight Authentication Protocol for Unmanned Aerial Vehicle [J].
Shariq, Mohd ;
Conti, Mauro ;
Singh, Karan ;
Dwivedi, Sanjeev Kumar ;
Abdussami, Mohammad ;
Amin, Ruhul ;
Masud, Mehedi .
COMPUTER COMMUNICATIONS, 2024, 228