Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
Edris, Ed Kamya Kiyemba, Aiash, Mahdi ORCID: https://orcid.org/0000-0002-3984-6244 and Loo, Jonathan
(2022)
Formalization and evaluation of EAP-AKA’ protocol for 5G network access security.
Array, 16
, 100254.
ISSN 2590-0056
[Article]
(doi:10.1016/j.array.2022.100254)
|
PDF
- Published version (with publisher's formatting)
Available under License Creative Commons Attribution 4.0. Download (4MB) | Preview |
|
![]() |
PDF
- Final accepted version (with author's formatting)
Restricted to Repository staff and depositor only Download (797kB) |
Abstract
The end user’s Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP–AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol’s performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results.
Item Type: | Article |
---|---|
Theme: | |
Keywords (uncontrolled): | 5G, EAP-AKA, Security protocol, Formal methods, Verification, Authentication, ProVerif, Applied pi calculus, Performance evaluation |
Research Areas: | A. > School of Science and Technology > Computer Science |
Item ID: | 36658 |
Notes on copyright: | © 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/) |
Useful Links: | |
Depositing User: | Mahdi Aiash |
Date Deposited: | 26 Oct 2022 08:36 |
Last Modified: | 07 Dec 2022 17:28 |
URI: | https://eprints.mdx.ac.uk/id/eprint/36658 |
Actions (login required)
![]() |
View Item |
Statistics
Additional statistics are available via IRStats2.