Loading [MathJax]/extensions/TeX/ieee_stixext.js
The 5G-AKA Authentication Protocol Privacy | IEEE Conference Publication | IEEE Xplore

The 5G-AKA Authentication Protocol Privacy

Free

Abstract:

We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G v...Show More

Abstract:

We study the 5G-AKA authentication protocol described in the 5G mobile communication standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions through the use of asymmetric randomized encryption. Nonetheless, we show that except for the IMSI-catcher attack, all known attacks against 5G-AKA privacy still apply. Next, we modify the 5G-AKA protocol to prevent these attacks, while satisfying 5G-AKA efficiency constraints as much as possible. We then formally prove that our protocol is sigma-unlinkable. This is a new security notion, which allows for a fine-grained quantification of a protocol privacy. Our security proof is carried out in the Bana-Comon indistinguishability logic. We also prove mutual authentication as a secondary result.
Date of Conference: 17-19 June 2019
Date Added to IEEE Xplore: 22 August 2019
ISBN Information:
Conference Location: Stockholm, Sweden

References

References is not available for this document.