Formal verification of secondary authentication protocol for 5G secondary authentication

Edris, Ed Kamya Kiyemba, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Alhakeem, Mohammad Shadi (2021) Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks, 16 (4). pp. 223-234. ISSN 1747-8405

[thumbnail of Formal_verification_5G.pdf]
Preview
PDF
Formal_verification_5G.pdf - Accepted Version

Download (650kB) | Preview

Abstract

The fifth-generation mobile network (5G) will enable interconnectivity between the home network (HN) and data network (DN) whereby mobile users with their user equipment (UE) will be able to access services provided by external service providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication protocols used. For 5G, primary authentication between the UE and the HN has been defined and specified by the Third Generation Partnership Project (3GPP) while the secondary authentication has also been defined but not specified. 3GPP recommends the extensible authentication protocol (EAP) framework for secondary authentication between the UE and the SP. However, the secondary authentication methods have not been formally verified, so this paper proposes a secondary authentication protocol (SAP) for service authentication and provides a comprehensive formal analysis using ProVerif a security protocol verifier. Finally, it conducts a security analysis on the protocol's security properties.

Item Type: Article
Identifier: 10.1504/IJSN.2021.10043015
Additional Information: © 2021 Inderscience Enterprises Ltd. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1504/ijsn.2021.10043015.
Keywords: 5G; secondary authentication; security protocol; services; formal methods; ProVerif; applied Pi calculus
Subjects: Computing > Systems > Computer networking
Computing > Information security > Cyber security
Computing > Systems > Distributed computing
Related URLs:
Depositing User: Jonathan Loo
Date Deposited: 03 Dec 2021 09:41
Last Modified: 06 Feb 2024 16:08
URI: https://repository.uwl.ac.uk/id/eprint/8455

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu