摘要
5G技术的普及促进了各行业生产力的发展,但5G网络的安全性问题也逐渐凸显,基站作为连接用户设备和核心网的枢纽,其安全性备受关注。由于基站通过广播发送的系统消息缺乏真实性和完整性的保护,攻击者可以通过修改系统消息,吸引用户设备在初始接入或者在小区重选时连接到伪基站,从而发起多种后续攻击。针对这一问题,文章提出了一种基于无证书签名的基站身份认证协议,为用户设备提供了一种验证基站广播系统消息合法性的方法,并从签名消息的选择、签名和验证的开销、抵御重放攻击几个方面进行了优化。仿真实验表明,该协议引入的计算开销是基站和用户设备可以接受的,与现有的基站身份认证协议相比,该协议提高了安全性,实现了更小的签名长度。
The popularization of 5G technology has promoted the development of productivity in various industries,but the security of 5G networks has gradually become prominent,and the security of base stations,as a hub connecting user equipment and the core network,has attracted much attention.Due to the lack of authenticity and integrity protection of the system information messages sent by the base station through broadcasting,attackers can modify the system information messages to attract user devices to connect to the fake base station during initial access or cell reselection,so as to launch a variety of subsequent attacks.In order to solve this problem,this paper proposed a base station identity authentication protocol based on certificateless signature,which provided a method for user equipment to verify the legitimacy of base station broadcasting system messages,and optimized the selection of signed messages,the overhead of signing and verification,and the defense against replay attacks.Simulation results show that the computational overhead introduced by this scheme is acceptable to the base station and user equipment,and compared with the existing base station identity authentication protocols,the proposed scheme improves the security and achieves the minimum signature length.
作者
孙中岫
彭诚
范伟
SUN Zhongxiu;PENG Cheng;FAN Wei(Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China)
出处
《信息网络安全》
CSCD
北大核心
2024年第8期1220-1230,共11页
Netinfo Security
基金
国家重点研发计划[2021YFB2700603]。
关键词
5G空口
伪基站
身份验证
无证书公钥密码
5G air interface
pseudo base stations
identity authentication
certificateless public key cryptography