A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

被引:16
|
作者
Chow, Man Chun [1 ]
Ma, Maode [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Qatar Univ, Coll Engn, POB 2713, Doha, Qatar
关键词
5G; 5G-AKA; authentication; blockchain; BAN logic; Scyther; PROTOCOL; HANDOVER;
D O I
10.3390/s22124525
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol for mutually authenticating user equipment (UE), base stations, and the core network. However, it has been found that 5G-AKA is vulnerable to many attacks, including linkability attacks, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. To address these security issues and improve the robustness of the 5G network, in this paper, we introduce the Secure Blockchain-based Authentication and Key Agreement for 5G Networks (5GSBA). Using blockchain as a distributed database, our 5GSBA decentralizes authentication functions from a centralized server to all base stations. It can prevent single-point-of-failure and increase the difficulty of DDoS attacks. Moreover, to ensure the data in the blockchain cannot be used for device impersonation, our scheme employs the one-time secret hash function as the device secret key. Furthermore, our 5GSBA can protect device anonymity by mandating the encryption of device identities with Subscription Concealed Identifiers (SUCI). Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie-Hellman (ECDH). We use Burrows-Abadi-Needham (BAN) logic and the Scyther tool to formally verify our protocol. The security analysis shows that 5GSBA is superior to 5G-AKA in terms of perfect forward secrecy, device anonymity, and mutual Authentication and Key Agreement (AKA). Additionally, it effectively deters linkability attacks, replay attacks, and most importantly, DoS and DDoS attacks. Finally, the performance evaluation shows that 5GSBA is efficient for both UEs and base stations with reasonably low computational costs and energy consumption.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Braeken, An
    Liyanage, Madhusanka
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1324 - 1331
  • [2] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [3] Blockchain-based Authentication for 5G Networks
    Haddad, Zaher
    Fouda, Mostafa M.
    Mahmoud, Mohamed
    Abdallah, Mohamed
    2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, 2020, : 189 - 194
  • [4] A Blockchain-Based Authentication Scheme for 5G Applications
    Ren, Lanfang
    Huang, Xiaoting
    Zhou, Huachun
    Yang, Bo
    Su, Li
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 155 - 168
  • [5] Optimizing PKI for 3GPP Authentication and Key Agreement
    Chen Zemao
    Zhao Junge
    Huang Biyi
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 79 - 82
  • [6] New enhanced 3GPP authentication and key agreement
    Jiang, Rui
    Li, Jianhua
    Pan, Li
    Tie, Ling
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (12): : 147 - 149
  • [7] A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles
    Zheng, Jing
    Wang, Xiaoliang
    Yang, Qing
    Xiao, Wenhui
    Sun, Yapeng
    Liang, Wei
    CONNECTION SCIENCE, 2022, 34 (01) : 1430 - 1453
  • [8] Security analysis of 3GPP authentication and key agreement protocol
    Lu F.
    Zheng K.-F.
    Niu X.-X.
    Yang Y.-X.
    Li Z.-X.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (07): : 1768 - 1782
  • [9] Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
    Lee, Cheng-Chi
    Chen, Chin-Ling
    Ou, Hsia-Hung
    Chen, Lung Albert
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (03) : 861 - 872
  • [10] Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
    Cheng-Chi Lee
    Chin-Ling Chen
    Hsia-Hung Ou
    Lung Albert Chen
    Wireless Personal Communications, 2013, 68 : 861 - 872