Formal Analysis of 5G Authentication

06/27/2018
by   David Basin, et al.
0

Mobile communication networks connect much of the world's population. The security of every user's calls, SMSs, and mobile data, depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5G AKA. We also extract precise requirements from the 3GPP standards defining 5G and we identify missing security goals. Using the security protocol verification tool Tamarin, we conduct a full, systematic, security evaluation of the model with respect to the 5G security goals. Our evaluation automatically identifies the minimal security assumptions required for each security goal and we find that some critical security goals are not met, except under additional assumptions missing from the standard. Finally, we make explicit recommendations with provably secure fixes for the attacks and weaknesses we found.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2021

Formal Modelling and Security Analysis of Bitcoin's Payment Protocol

The Payment Protocol standard BIP70, specifying how payments in Bitcoin ...
research
11/28/2022

Security Analysis of the Consumer Remote SIM Provisioning Protocol

Remote SIM provisioning (RSP) for consumer devices is the protocol speci...
research
11/17/2020

SoK on Performance Bounds in Anonymous Communication

Communicating anonymously comes at a cost - and large communities have b...
research
04/17/2019

The current state of affairs in 5G security and the main remaining security challenges

The first release of the 5G protocol specifications, 3rd Generation Part...
research
09/08/2022

Security Analysis of the EDHOC protocol

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact ...
research
08/18/2022

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols

Facilitated by messaging protocols (MP), many home devices are connected...
research
05/26/2023

Panini – Anonymous Anycast and an Instantiation

Anycast messaging (i.e., sending a message to an unspecified receiver) h...

Please sign up or login with your details

Forgot password? Click here to reset