An enhanced symmetric-key based 5G-AKA protocol
نویسندگان
چکیده
5G technology is called to support the next generation of wireless communications and realize “Internet Everything” through its mMTC (massive Machine-Type-Communications) service. The recently standardized 5G-AKA protocol intended deal with security privacy issues detected in earlier generations. Nevertheless, several shortcomings have been reported, including a possibly excessive computational complexity for many IoT devices. To address these, promising lightweight 2-pass authentication key agreement (AKA) mobile has proposed by Braeken. Compared protocol, this does not require use public encryption. This paper analyzes claims Braeken’s shows that it provide full unlinkability, but only session (still) subject Linkability AKA Failure Messages (LFM) attacks. We propose solutions such problems prove symmetric-key based protocols cannot offer higher protection levels without compromising availability. then describe an enhanced version addresses these vulnerabilities supports forward secrecy, which desirable feature low-cost
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملEnhanced Adaptive Security Protocol in Lte Aka
A Telecommunication systems trust and privacy is as good as its security mechanism. Its security design keep evolving over time as new treats and technology evolve. LTE/SAE is 3GPP’s wireless Communication new DNA, a move away from a hybrid of packet switched and circuit switched network which 3G networks possess, though with room for backward compatibility. LTE/SAE’s new architecture is a flat...
متن کاملEnhanced password-based key establishment protocol
In this paper we analyse a password-based authenticated key establishment protocol due to Laih, Ding and Huang, which enables a user to authenticate himself to a server and negotiate a shared session key. This protocol is also designed to guarantee that a human being is actually involved in an ongoing protocol execution. However we show that the protocol suffers from offline dictionary attacks....
متن کاملAn effective AKA protocol for UMTS
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...
متن کاملAn Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2021
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2021.108373