期刊文献+

5G网络认证及密钥协商协议的安全性分析 被引量:3

Security analysis of 5G authentication and key agreement protocol
原文传递
导出
摘要 5G网络发展迅速,作为系统安全基础的认证和密钥协商协议,其安全性是5G安全的核心问题。该文借助TAMARIN证明程序对5G网络中的EAP-AKA'协议进行建模分析。通过分析协议规范将安全性需求归纳为保密属性和认证属性两种安全属性,利用TAMARIN建立模型来验证不同安全属性的满足程度。根据TAMARIN证明程序返回的验证结果,该文发现了SEAF与AUSF间关于SNID的单射一致性违反以及锚定密钥K_(SEAF)前向保密性的违反,从而发现了重放攻击、身份验证同步失败攻击以及锚定密钥K_(SEAF)泄露攻击,并针对这些攻击提出了相应的安全加固方法,最后对方法进行理论分析和实验验证。 5G networks are developing rapidly.The security of the authentication and key agreement protocols is the core issue of 5G security.The TAMARIN prover is used here to analyze the EAP-AKA'protocol for 5G networks.The protocol specifications are analyzed to identify the security requirements as a confidential attribute and an authentication attribute.A model is then established according to the TAMARIN standard to verify that these security attributes are satisfied.The verification results show a single shot consistency violation between SEAF and AUSF regarding SNID and a violation of the forward secrecy of the anchor key K_(SEAF),which may lead to the network experiencing replay attacks,authentication synchronization failure attacks,and Anchor key K_(SEAF) leak attacks.Security hardening methods are then presented for these attacks with theoretical and experimental verification.
作者 贾凡 严妍 袁开国 赵璐婧 JIA Fan;YAN Yan;YUAN Kaiguo;ZHAO Lujing(School of Electronic and Information Engineering,Beijing Jiaotong University,Beijing 100044,China;China Cybersecurity Review Technology and Certification Center,Beijing 100020,China;School of Cyberspace Security,Beijing University of Posts and Telecommunication,Beijing 100876,China)
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2021年第11期1260-1266,共7页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61872033)。
关键词 5G网络安全 EAP-AKA' Lowe分类法 TAMARIN 5G network security EAP-AKA' Lowe's taxonomy TAMARIN
  • 相关文献

参考文献6

二级参考文献29

  • 1袁亚飞,廉玉忠.3G认证与密钥分发协议逻辑化分析[J].信息工程大学学报,2004,5(4):15-17. 被引量:5
  • 2蒋睿,李建华,潘理.基于串空间模型的3GPP认证密钥交换协议分析[J].上海交通大学学报,2006,40(5):791-795. 被引量:5
  • 3刘峰,李大兴.3G认证与密钥分配协议的改进[J].计算机工程与设计,2006,27(14):2705-2707. 被引量:3
  • 4刘家芬,周明天.对安全协议重放攻击的分类研究[J].计算机应用研究,2007,24(3):135-139. 被引量:16
  • 5Zhang M X, Fang Y G. Security analysis and enhance-ments of 3 GPP authentication and key agreement protocol[J]. IEEE Trans on Wireless Communications, 2005,4(2): 734-742.
  • 6Huang Yulun, Shen Chih Ya, Shiuhpyng Winston Shieh.S-AKA : a provable and secure authentication key agree-ment protocol for UMTS networks [ J ]. IEEE Trans on Ve-hicular Technology, 2011, 9(60) : 4509-4519.
  • 73rd Generation Partnership Project. Technical specifica-tion group services and system aspects, 3G security, se-curity architecture [ S]. 2014.
  • 83GPP TR33.821.3rd Generation Partnership Project.Technical Specification Group Service and System Aspects.Rationale andT rack of Security Decisions in Long Term EvolvedRAN/3GPP System Architecture Evolution(Release 9)[R],2009:34-68.
  • 93GPP TS33.401.3rd Generation Partnership Project.Technical Specification Group Service and System Aspects.3GPP System Architecture Evolution/Security Architecture.(Release 12)[R],2014:45-78.
  • 10Koien G M.Mutual Entity Authentication for LTE.7th International WirelessC ommunications and Mobile Computing Conference[C]∥IWCMC 2011,Istanbul,Turkey,2011:689-694.

共引文献139

同被引文献19

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部