2019 11th International Conference on Advanced Computing (ICoAC) 2019
DOI: 10.1109/icoac48765.2019.247139
|View full text |Cite
|
Sign up to set email alerts
|

Randomized 5G AKA Protocol Ensembling Security in Fast Forward Mobile Device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Adversaries can also take advantage of the flexibility of orchestration, internal agents, authentication failure, physical downlink control channel, confidentiality failures in the communication channel, sensor networks vulnerabilities, cloud radio access networks vulnerabilities [Jeyakumar and Rajabhushanam, 2019], C-RAN vulnerabilities [Tian et al, 2017], EAP-TLS vulnerabilities [Zhang et al, 2020b], Subscriber Identity Module (SIM) vulnerabilities [Zhao et al, 2021d], machine learning models vulnerabilities [Suomalainen et al, 2020], software-defined mobile networks vulnerabilities, named data networks vulnerabilities [Bertino and Nabeel, 2018], MEC vulnerabilities, UE vulnerabilities [Amgoune and Mazri, 2018;Mahmoud et al, 2021], D2D communication vulnerabilities [Abd-Elrahman et al, 2015a,b], System Information Block (SIB) and RRC message parameters in 5G NR, edge security flaw, key sent over an insecure channel, security flaw in NS [Martini et al, 2020;Kotulski et al, 2017;Sattar et al, 2021;Cáceres-Hidalgo and Avila-Pesantez, 2021;Olimid and Nencioni, 2020], credential theft, devices without robust security mechanisms, 5G-AKA vulnerabilities [Basin et al, 2018;Pari et al, 2019], and security flaws in NFV and SDN [Ahmad et al, 2021[Ahmad et al, , 2019[Ahmad et al, , 2018Taheribakhsh et al, 2020]. Operating Systems (OS) using insecure protocols provide excessive privileges, IoT devices may have different protocols, lack processing robustness, and fail to control sensitive data privacy.…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…Adversaries can also take advantage of the flexibility of orchestration, internal agents, authentication failure, physical downlink control channel, confidentiality failures in the communication channel, sensor networks vulnerabilities, cloud radio access networks vulnerabilities [Jeyakumar and Rajabhushanam, 2019], C-RAN vulnerabilities [Tian et al, 2017], EAP-TLS vulnerabilities [Zhang et al, 2020b], Subscriber Identity Module (SIM) vulnerabilities [Zhao et al, 2021d], machine learning models vulnerabilities [Suomalainen et al, 2020], software-defined mobile networks vulnerabilities, named data networks vulnerabilities [Bertino and Nabeel, 2018], MEC vulnerabilities, UE vulnerabilities [Amgoune and Mazri, 2018;Mahmoud et al, 2021], D2D communication vulnerabilities [Abd-Elrahman et al, 2015a,b], System Information Block (SIB) and RRC message parameters in 5G NR, edge security flaw, key sent over an insecure channel, security flaw in NS [Martini et al, 2020;Kotulski et al, 2017;Sattar et al, 2021;Cáceres-Hidalgo and Avila-Pesantez, 2021;Olimid and Nencioni, 2020], credential theft, devices without robust security mechanisms, 5G-AKA vulnerabilities [Basin et al, 2018;Pari et al, 2019], and security flaws in NFV and SDN [Ahmad et al, 2021[Ahmad et al, , 2019[Ahmad et al, , 2018Taheribakhsh et al, 2020]. Operating Systems (OS) using insecure protocols provide excessive privileges, IoT devices may have different protocols, lack processing robustness, and fail to control sensitive data privacy.…”
Section: Item Description Item Descriptionmentioning
confidence: 99%
“…MACs are added to ensure data integrity and mutual authentication between UE and ARPF or SEAF. [10] [12] enhances forward security and post-compromise security. [11] uses blockchain to promote user anonymity and protect the HN from DoS attacks.…”
Section: Discussionmentioning
confidence: 99%
“…The scheme can preserve data integrity and reduce delay to some extent. S. N. Pari et al [10] proposed a randomized 5G AKA protocol in fast forward mobile devices. In their protocol, the enhancement of security challenges that may occur in the 5G AKA protocol has been proposed.…”
Section: Access Authenticationmentioning
confidence: 99%