Formalization and evaluation of EAP-AKA’ protocol for 5G network access security

Edris, Ed Kamya Kiyemba, Aiash, Mahdi ORCID logoORCID: https://orcid.org/0000-0002-3984-6244 and Loo, Jonathan (2022) Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array, 16 , 100254. ISSN 2590-0056 [Article] (doi:10.1016/j.array.2022.100254)

[img]
Preview
PDF - Published version (with publisher's formatting)
Available under License Creative Commons Attribution 4.0.

Download (4MB) | Preview
[img] PDF - Final accepted version (with author's formatting)
Restricted to Repository staff and depositor only

Download (797kB)

Abstract

The end user’s Quality of Experience (QoE) will be improved while accessing services in Fifth Generation Mobile Network (5G), supported by enhanced security and privacy. The security guarantees offered by the Authentication and Key Agreement (AKA) protocols will be depended upon by end users and network operators. The AKA protocols have been standardized for 5G networks, and the Extensible Authentication Protocol (EAP)-AKA’ protocol is one of the main authentication mechanisms that has been specified for User Equipment (UE) and network mutual authentication. This article models the EAP-AKA’ protocol and conducts an extensive formal verification of the EAP-AKA’ protocol as defined in the 5G security standard to determine whether the protocol is verifiably secure for 5G. It provides a security evaluation of the EAP–AKA’ protocol based on the current 5G specifications using ProVerif, a security protocol proof verifier. It also presents security properties that support the security verification, as well as quantitative properties that are used to assess the protocol’s performance. Finally, it compares the EAP-AKA’ and 5G-AKA protocols’ security and performance results.

Item Type: Article
Theme:
Keywords (uncontrolled): 5G, EAP-AKA, Security protocol, Formal methods, Verification, Authentication, ProVerif, Applied pi calculus, Performance evaluation
Research Areas: A. > School of Science and Technology > Computer Science
Item ID: 36658
Notes on copyright: © 2022 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
Useful Links:
Depositing User: Mahdi Aiash
Date Deposited: 26 Oct 2022 08:36
Last Modified: 07 Dec 2022 17:28
URI: https://eprints.mdx.ac.uk/id/eprint/36658

Actions (login required)

View Item View Item

Statistics

Activity Overview
6 month trend
0Downloads
6 month trend
0Hits

Additional statistics are available via IRStats2.