2022
DOI: 10.3390/info13030125
|View full text |Cite
|
Sign up to set email alerts
|

5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks

Abstract: The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Furthermore, ref. [ 17 ] identified shortcomings, such as the lack of support for forward secrecy through an analysis of 5G-AKA. In this regard, improved protocols, including [ 3 , 16 , 17 , 20 , 21 ], have been proposed to address such vulnerabilities in 5G-AKA.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, ref. [ 17 ] identified shortcomings, such as the lack of support for forward secrecy through an analysis of 5G-AKA. In this regard, improved protocols, including [ 3 , 16 , 17 , 20 , 21 ], have been proposed to address such vulnerabilities in 5G-AKA.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, ref. [ 17 ] presented shortcomings of 5G-AKA, including the lack of support for forward secrecy, also known as perfect forward secrecy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposal facilitates fast 5G handover authentication by using time-to-live (TTL) attributes and encrypting the next hop chaining counter (NCC) with the Chinese remainder theorem. There are also some other schemes, including [24][25][26][27][28], proposed recently to fix other security issues in EPS-AKA and 5G-AKA. However, all of them suffer from single-point-of-failure due to the centralized protocol designs.…”
Section: Aka Schemes Against Dos and Ddos Attacksmentioning
confidence: 99%
“…Vulnerable to DDoS due to centralized design [24] Formally verified protocol [25] Lightweight symmetric key-based protocol [26] Formally verified protocol [27] Backward compatibility with 5G-AKA [28] DDoS prevention using zero-knowledge proof Centralized design, lack of formally verified protocol…”
Section: Lightweight and Formally Verified Handover Authenticationmentioning
confidence: 99%