2020
DOI: 10.1109/access.2020.2993111
|View full text |Cite
|
Sign up to set email alerts
|

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives

Abstract: The fifth generation (5G) technology offers a set of security services in order to provide secure communication to a large number of various devices. 5G Authentication and Key Agreement (5G-AKA) authentication service acts as the first step of securing the 5G network communication. This paper aims to quantitatively analyze the dependability of 5G-AKA authentication service. We develop the continuoustime Markov chain (CTMC) models to capture the operational details of the 5G-AKA authentication services when fac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…In cell coverage, the eNB uses the C-RNTI to update the location of UE. e C-RNTI is constant in the same cell coverage area, whereas it changes if the UE moves from one coverage area to another as shown in Figure 2 [17,18].…”
Section: User and Location Privacymentioning
confidence: 99%
“…In cell coverage, the eNB uses the C-RNTI to update the location of UE. e C-RNTI is constant in the same cell coverage area, whereas it changes if the UE moves from one coverage area to another as shown in Figure 2 [17,18].…”
Section: User and Location Privacymentioning
confidence: 99%
“…Conversely, some researchers have assumed the same architecture of 4G for 5G networks with new proposals for enhanced user identity privacy. Two groups are working on security architecture and AKA proposal in 5G using the standard guideline [9]. Low computation complexity and communication overhead have been achieved due to the consideration of similar security architecture for the previous generations; the proposal can also fit easily in the preceding generations and the current architecture.…”
Section: Figure 1: Authentication and Key Agreement (Aka) In 4gmentioning
confidence: 99%
“…(8) The sequence number SQN UE is updated, and the IK, CK, and response RES are computed. (9) The VMSI updates to s.V NEW . (10) The keys IK and CK are stored in the UE, and the RES is sent back to the MME.…”
Section: Algorithmmentioning
confidence: 99%
“…When UEA wants to deliver message M to UEB by employing symmetric encryption and decryption, M passes through RANA-UPFA-ECA-DN-ECB-UPFB-RANB to UEB. The message delivery consists of two stages: session establishment 1 and message transmission 2 .…”
Section: Symmetric Cryptographymentioning
confidence: 99%
“…In a 5G network, when user equipment (UE) is switched on and connected to a base station (BS), the 5G core (5GC) of this network will authenticate this UE [1,2]. After authentication, the 5GC provides encryption and decryption services individually in its access stratum (AS) and non-access stratum (NAS) [3], aiming to confirm UE's security and prevent data from leakage when packets are transmitted via these two stratums.…”
Section: Introductionmentioning
confidence: 99%