Formal verification of secondary authentication protocol for 5G secondary authentication

Edris, Ed Kamya Kiyemba, Aiash, Mahdi ORCID logoORCID:, Loo, Jonathan and Alhakeem, Mohammad Shadi (2020) Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks . ISSN 1747-8405 [Article] (Accepted/In press)

[img] PDF - Final accepted version (with author's formatting)
Restricted to Repository staff and depositor only

Download (464kB)


The Fifth-Generation mobile network (5G) will enable interconnectivity between the Home Network (HN) and Data Network (DN) whereby mobile users with their User Equipment (UE) will be able to access services provided by external Service Providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the Extensible Authentication Protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a Secondary Authentication Protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol's security properties.

Item Type: Article
Research Areas: A. > School of Science and Technology > Computer Science
Item ID: 31369
Useful Links:
Depositing User: Mahdi Aiash
Date Deposited: 13 Nov 2020 18:34
Last Modified: 08 Jun 2022 11:23

Actions (login required)

View Item View Item


Activity Overview
6 month trend
6 month trend

Additional statistics are available via IRStats2.