Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model

نویسندگان

چکیده

The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd partnership project (3GPP) includes three cases because it introduces synchronization failure message code (MAC) procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is fully considered existing formal analysis improvement of 5G AKA protocol. To solve problem, paper formally analyzes security latest version based on mixed strand space model for protocols finds many new attacks, including cross attacks cases. Then, a secure efficient primary agreement networks proposed, which named 5G-AKA’. In 5G-AKA’ protocol, pre-shared user equipment (UE) home network (HN) replaced with derivation key, challenge–response mechanism serving (SN) HN added, subscription permanent identifier (SUPI) UE added to second SN HN, MAC timeout HN. Finally, proved can overcome Additionally, comparative shows better than recently improved security, backward compatible

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Verification of a Group Membership Protocol Using Model Checking

The development of safety-critical embedded applications in domains such as automotive or avionics is an exceedingly challenging intellectual task. This task can, however, be significantly simplified through the use of middleware that offers specialized fault-tolerant services. This middleware must provide a high assurance level that it operates correctly. In this paper, we present a formal ver...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Formal Verification of Payment protocol using AVISPA

Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. Specifically protocol used in ecommerce transactions needs to be verified for their security properties. Verification of these protocols is done using the formal verification tools. AVISPA is one of the evolving tools used mai...

متن کامل

Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model

A multi-party fair exchange protocol is a cryptographic protocol allowing several parties to exchange commodities in such a way that everyone gives an item away if and only if it receives an item in return. In this paper we discuss a multi-party fair exchange protocol originally proposed by Franklin and Tsudik, and subsequently shown to have flaws and fixed by González and Markowitch. We identi...

متن کامل

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2022

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics11091333