Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Threats to 5G group-based authentication

Giustolisi, Rosario and Gehrmann, Christian LU (2016) 13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016 4. p.360-367
Abstract

The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.

Please use this url to cite or link to this publication:
author
and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
5G, AKA, EPS-AKA, Internet of things, LTE, Security analysis, Threat analysis, Threat model
host publication
ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
editor
Callegari, Christian ; van Sinderen, Marten ; Cabello, Enrique ; Samarati, Pierangela ; Lorenz, Pascal ; Obaidat, Mohammad S. and Sarigiannidis, Panagiotis
volume
4
pages
8 pages
publisher
SciTePress
conference name
13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016
conference location
Lisbon, Portugal
conference dates
2016-07-26 - 2016-07-28
external identifiers
  • scopus:85003881400
ISBN
9789897581960
DOI
10.5220/0005996203600367
language
English
LU publication?
no
id
0d4c720f-fc06-4eac-9629-26abc0f619c5
date added to LUP
2018-11-21 16:10:25
date last changed
2022-03-25 06:09:30
@inproceedings{0d4c720f-fc06-4eac-9629-26abc0f619c5,
  abstract     = {{<p>The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.</p>}},
  author       = {{Giustolisi, Rosario and Gehrmann, Christian}},
  booktitle    = {{ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications}},
  editor       = {{Callegari, Christian and van Sinderen, Marten and Cabello, Enrique and Samarati, Pierangela and Lorenz, Pascal and Obaidat, Mohammad S. and Sarigiannidis, Panagiotis}},
  isbn         = {{9789897581960}},
  keywords     = {{5G; AKA; EPS-AKA; Internet of things; LTE; Security analysis; Threat analysis; Threat model}},
  language     = {{eng}},
  month        = {{07}},
  pages        = {{360--367}},
  publisher    = {{SciTePress}},
  title        = {{Threats to 5G group-based authentication}},
  url          = {{http://dx.doi.org/10.5220/0005996203600367}},
  doi          = {{10.5220/0005996203600367}},
  volume       = {{4}},
  year         = {{2016}},
}