2021
DOI: 10.1007/s11277-021-09036-4
|View full text |Cite
|
Sign up to set email alerts
|

SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network

Abstract: Recently, the Third Generation Partnership Project (3GPP) has initiated to work in the Fifth Generation (5G) network to fulfill the security characteristics of IoT-based services. 3GPP has proposed the 5G handover key structure and framework in a recently published technical report. In this paper, we evaluate the handover authentication methodologies available in the literature and identify the security vulnerabilities such as violation of global base-station, failure of key forward/backward secrecy, de-synchr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…This section presents the security features verification as mentioned in II-C. We conduct the informal as well as the formal (Syther and GNY logic) security verification to show the proposed protocol's robustness against the identified attacks. The research carried out in [28], [29] shows that [1] is vulnerable to various attacks such as confidentiality and MiTM. [1], [30] shows that [31] does not offer the perfect forward secrecy, no formal verification, and confidentiality.…”
Section: A Security Features Verificationmentioning
confidence: 99%
“…This section presents the security features verification as mentioned in II-C. We conduct the informal as well as the formal (Syther and GNY logic) security verification to show the proposed protocol's robustness against the identified attacks. The research carried out in [28], [29] shows that [1] is vulnerable to various attacks such as confidentiality and MiTM. [1], [30] shows that [31] does not offer the perfect forward secrecy, no formal verification, and confidentiality.…”
Section: A Security Features Verificationmentioning
confidence: 99%