TY - JOUR
T1 - Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
AU - Braeken, An
PY - 2020/11/9
Y1 - 2020/11/9
N2 - The recently standardised 5G AKA protocol, to be used in the next generation of mobile communications, possesses some severe shortcomings. In particular, different types of attacks, leaking parts of the identity, activity pattern and localisation of the user, have been proposed in literature. In this paper, we propose a new version of the 5G AKA protocol, capable of offering resistance to all the known attacks and providing the required security features like anonymity, unlinkability, mutual authentication and confidentiality. The proposed protocol is completely symmetric key based and relies on cryptographic primitives currently available in the hardware of the universal subscriber identity module (USIM). Compared to the original protocol or other recently proposed versions, our protocol does not require the usage of public key encryption for hiding the real identity. Also the number of communication phases in the protocol is optimised and limited to two. The security of the protocol has been demonstrated using RUBIN logic.
AB - The recently standardised 5G AKA protocol, to be used in the next generation of mobile communications, possesses some severe shortcomings. In particular, different types of attacks, leaking parts of the identity, activity pattern and localisation of the user, have been proposed in literature. In this paper, we propose a new version of the 5G AKA protocol, capable of offering resistance to all the known attacks and providing the required security features like anonymity, unlinkability, mutual authentication and confidentiality. The proposed protocol is completely symmetric key based and relies on cryptographic primitives currently available in the hardware of the universal subscriber identity module (USIM). Compared to the original protocol or other recently proposed versions, our protocol does not require the usage of public key encryption for hiding the real identity. Also the number of communication phases in the protocol is optimised and limited to two. The security of the protocol has been demonstrated using RUBIN logic.
UR - http://www.scopus.com/inward/record.url?scp=85088827270&partnerID=8YFLogxK
U2 - 10.1016/j.comnet.2020.107424
DO - 10.1016/j.comnet.2020.107424
M3 - Article
VL - 181
JO - Computer Networks
JF - Computer Networks
SN - 1389-1286
M1 - 107424
ER -