Next Article in Journal
Surface-Enhanced Raman Scattering in Silver-Coated Suspended-Core Fiber
Next Article in Special Issue
An IoT System for Air Pollution Monitoring with Safe Data Transmission
Previous Article in Journal
A Machine Learning App for Monitoring Physical Therapy at Home
Previous Article in Special Issue
Sensors and Pattern Recognition Methods for Security and Industrial Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

1
Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea
2
Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Tokyo 135-0064, Japan
3
Department of Cyber Security, Ewha Womans University, Seoul-si 03760, Republic of Korea
4
School of Computing and Information Technology, University of Wollongong, Northfields Avenue, Wollongong, NSW 2522, Australia
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(1), 159; https://doi.org/10.3390/s24010159
Submission received: 5 November 2023 / Revised: 15 December 2023 / Accepted: 22 December 2023 / Published: 27 December 2023

Abstract

:
5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authentication, the initial step in securing access to 5G network environments. For the 5G primary authentication, two protocols, namely 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′), were proposed and standardized, where the former is for 3GPP devices, and the latter is for non-3GPP devices. Recent scrutiny has unveiled vulnerabilities in the 5G-AKA protocol, exposing it to security breaches, including linkability attacks. Moreover, mobile communication technologies are dramatically evolving while 3GPP has standardized Authentication and Key Management for Applications (AKMA) to reuse the credentials, generated during primary authentication, for 5G network applications. That makes it so significant for 5G-AKA to be improved to support forward secrecy as well as address security attacks. In response, several protocols have been proposed to mitigate these security challenges. In particular, they tried to strengthen security by reusing secret keys negotiated through the Elliptic Curve Integrated Encryption Scheme (ECIES) and countering linkability attacks. However, they still have encountered limitations in completing forward secrecy. Motivated by this, we propose an augmentation to 5G-AKA to achieve forward security and thwart linkability attacks (called 5G-AKA-FS). In 5G-AKA-FS, the home network (HN), instead of using its static ECIES key pair, generates a new ephemeral key pair to facilitate robust session key negotiation, truly realizing forward security. In order to thoroughly and precisely prove that 5G-AKA-FS is secure, formal security verification is performed by applying both BAN Logic and ProVerif. As a result, it is demonstrated that 5G-AKA-FS is valid. Besides, our performance comparison highlights that the communication and computation overheads are intrinsic to 5G-AKA-FS. This comprehensive analysis showcases how the protocol effectively balances between security and efficiency.

1. Introduction

Since the first deployment of the fifth generation (5G) mobile networks in 2019, 5G has rapidly become a mainstream mobile network worldwide. According to the Global System for Mobile Communications Association (GSMA), the 5G adoption rate reached 43.1% in the United States in Q4 2022 [1]. 5G mobile networks and telecommunication standards have been developed to meet the various demands of modern telecommunication. In particular, it is designed to support enhanced features such as Enhanced Mobile BroadBand (EMBB), Massive Machine-Type Communications (MMTC), and Ultra-Reliable and Low-Latency Communications (URLLC) [2].
In order to ensure the seamless delivery of high-quality services to users through these three features, 5G demands heightened security compared to its predecessors in mobile networks. Therefore, the 3rd Generation Partnership Project (3GPP) consortium, which is in charge of the standardization of 5G mobile networks, has standardized an essential 5G security architecture and procedures as well as several security features [3,4]. Figure 1 depicts the 3GPP 5G security architecture.
Notably, in 5G, primary authentication emerges as a cornerstone, representing the initial security checkpoint for accessing 5G network environments. For the 5G primary authentication, two protocols have been adopted as standards: 5G Authentication and Key Agreement (5G-AKA) and Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA ) [3,5]. The former caters to 3GPP devices, while the latter is tailored for non-3GPP devices.
The 5G primary authentication protocols, i.e., 5G-AKA and EAP-AKA , allow a user equipment (UE) (e.g., a mobile phone) and a home network (HN) (e.g., the network of a service provider) to authenticate each other and exchange key materials (e.g., anchor keys) to protect entire subsequent 5G communications. Note that they have been enhanced and markedly differentiated from their previous version (i.e., Evolved Packet System Authentication and Key Agreement (EPS-AKA) [4] and Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) [6]). The most distinctive feature of those security protocols in the 5G network is using a Subscriber Concealed Identifier (SUCI) that can be explained as a Subscriber Permanent Identifier (SUPI) in the encrypted format. In the previous generation, authentication was performed by transmitting the user identification information, International Mobile Subscriber Identity (IMSI), without encryption. On the other hand, in 5G, SUPI, which is a UE’s identifier, is encrypted into SUCI using a key derived through the Elliptic Curve Integrated Encryption Scheme (ECIES) before transmission to address identifier exposure [7,8,9,10]. Despite these efforts, 5G-AKA still remains vulnerable to various types of attacks [7,9,10,11,12,13,14]. Ref. [15] described vulnerabilities for 5G-AKA through formal verification and analysis. The authors showed that there still exist attack scenarios against 5G-AKA. In addition, refs. [10,16] pointed out that privacy problems of users may occur since 5G-AKA is susceptible to linkability attacks. Furthermore, ref. [17] presented shortcomings of 5G-AKA, including the lack of support for forward secrecy, also known as perfect forward secrecy.
Meanwhile, the 5G network environments face the following new challenges:
  • As the advancement of 5G technology and the proliferation of 5G network applications continue at a rapid pace, the emergence of new security threats and attacks becomes more pronounced, thereby necessitating the establishment of elevated security prerequisites.
  • Thanks to the Authentication and Key Management for Applications (AKMA) [18], the credentials generated through 5G primary authentication can be reused for application authentication in the 5G network environments; that is, the master session key negotiated during the 5G primary authentication is applied to derive an application key that allows a UE to authenticate itself to AKMA-based applications smoothly and efficiently.
Evidently, the security robustness of the existing 5G primary authentications falls short of addressing the aforementioned concerns. As a result, it becomes imperative to bolster the security framework with robust public key-based measures and ensure the implementation of forward secrecy.
Regarding EAP-AKA , there has been a standardization effort aimed at enhancing the protocol to incorporate support for forward secrecy (known as EAP-AKA -FS) [19]. On the 5G-AKA side, there are existing works proposed to support unlinkability and forward secrecy, such as [3,16,17,20,21]. In particular, those 5G-AKA enhancements attempted to reuse the ECIES shared key, which is used to protect the UE’s identifier in the initiation phase. However, in such an approach, if an adversarial security event happens in HN, forward secrecy is not guaranteed for the session key.
In this paper, we propose a 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol that supports forward secrecy and unlinkability together to solve the limitations of the existing studies and maximize the efficiency of authentication in 5G networks. The proposed protocol accomplishes forward secrecy and unlinkability by introducing an additional ECIES-based ephemeral key pair generation within HN. The main contributions of this paper are summarized as follows:
  • The 5G-AKA-FS protocol is designed to concurrently support forward secrecy and unlinkability.
  • We analyze the latest studies proposed to improve the vulnerabilities of 5G-AKA and provide a solid comparison of security attributes between our 5G-AKA-FS and the latest studies.
  • We conduct a rigorous security verification of the proposed protocol using formal verification (BAN Logic [22] and ProVerif [23]).
  • Performance evaluation is thoroughly carried out by measuring overhead in terms of computation and communication.
The rest of the paper is organized as follows. Section 2 explores the existing enhancements of 5G-AKA, while Section 3 describes the preliminaries used in this paper. Moving on to Section 4, we present a detailed description of the proposed protocol, followed by the formal security analysis using BAN Logic and ProVerif in Section 5. Assessing performance, Section 6 carries out a comparative evaluation of security properties between the proposed and existing protocols, along with measured overhead. Finally, Section 7 provides the conclusion.

2. Related Works

3GPP has defined two AKA protocols, namely 5G-AKA and Extensible Authentication Protocol (EAP)-AKA , for primary authentication in 5G networks. The purpose of the AKA protocols is to establish mutual authentication between the UE and the HN. In 2G to 4G networks, UE’s identifier IMSI is publicly exposed, thus resulting in privacy issues. However, in 5G-AKA, the subscriber identity information, known as SUPI, is encrypted into SUCI, which is then used for authentication while solving the privacy problem.
5G-AKA enhances authentication and key exchange in addition to introducing subscriber identity protection (e.g., SUCI) for privacy. However, as it is developed based on EPS-AKA, it inherits existing security vulnerabilities. Ref. [15] conducted a formal verification and analysis of the 5G-AKA protocol using the Mixed Strand Space model, revealing vulnerabilities within the protocol. Their study also presented 21 attack scenarios specific to 5G-AKA and highlighted security features not supported by 5G-AKA. Furthermore, ref. [17] identified shortcomings, such as the lack of support for forward secrecy through an analysis of 5G-AKA. In this regard, improved protocols, including [3,16,17,20,21], have been proposed to address such vulnerabilities in 5G-AKA.
SUCI-AKA, proposed by [20], aims to achieve forward secrecy for the anchor key K S E A F . For this goal, when generating the master session key K A U S F , the protocol reuses the shared key k H N , which is exchanged through ECIES to encrypt SUPI. In more details, the sequence number SQN is replaced with k H N during the generation of K A U S F . Such an approach enhances the security of the anchor and sub-session keys derived from K A U S F while still allowing the UE to verify if the received messages and their message authentication code (MAC) are fresh. However, SUCI-AKA can not support forward secrecy because the anchor key K S E A F is compromised when the long-term key k , shared between the UE and the HN, and the HN’s private key sk H N are leaked.
5G-IPAKA, proposed by [17], aims to provide mutual authentication between the UE and the SN, enhanced security for the anchor key and authentication vector (AV), and key confirmation. This protocol tries to provide forward secrecy by applying the ECIES secret k H N to generate the anchor key K S E A F , from which sub-sessions keys are then derived. Moreover, it lets the HN send K S E A F to the SN before the UE authentication. In this way, 5G-IPAKA enables the UE to authenticate the SN by verifying the SN’s message authentication code computed with K S E A F in addition to the HN. Similar to this, the UE is authenticated to the SN through its message authentication code. As a result, 5G-IPAKA achieves mutual authentication between the SN and the UE and between the HN and the UE while supporting key confirmation. However, if k and sk H N are leaked, an attacker can reconstruct the anchor key K S E A F for malicious purposes while breaking forward secrecy. Furthermore, active attacks by malicious SNs are also possible since the HN delivers K S E A F to the SN without authenticating the UE. Finally, this protocol leads to compatibility issues with Subscriber Identity Modules (SIMs) by proposing a structure that deviates from the existing standard specification.
5GAKA-LCCO, proposed by [21], aims to improve high communication and computation overheads as well as address SUCI replay attacks present in 5G-IPAKA. In this protocol, the SN first creates the random number and timestamp RAND S N and T S N , and sends to the UE these values, which are then applied to generate the key block with the long-term shared key k and the ECIES secret k H N . Note that the generated key block is not only used to compute the UE’s SUCI but also to authenticate the UE to the HN. Upon a receipt of the new SUCI, the HN decrypts it into the corresponding SUPI, counts on its timestamp T H N to validate the received T S N , and authenticates the UE. In such a way, the authentication process is optimized to have one round trip, reducing the computation and communication overhead. Also, the HN utilizes timestamps to prevent the SUCI replay and Denial-of-Service (DoS) attacks on itself while enhancing the security of the session keys by deriving K A U S F from sk H N , k , RAND S N , and T S N . However, it should be noted that when generating K A U S F , both k and sk H N are utilized. Therefore, if k and sk H N are leaked, an attacker can recover K A U S F and conduct subsequent malicious attacks. Furthermore, to address SUCI replay attacks, 5GAKA-LCCO introduces freshness to SUCI by utilizing T S N . However, this approach requires time synchronization, which may pose challenges in situations such as roaming. Consequently, the use of T S N is not desirable for mobile telecommunication scenarios. Furthermore, 5GAKA-LCCO exhibits an unconventional protocol flow compared to the 5G-AKA standard, and the differences in the AuthenticateSIMcommand can lead to compatibility issues, particularly with Legacy Universal Subscriber Identity Modules (USIMs), potentially resulting in backward compatibility problems.
5G-AKA , introduced by [16], focuses on addressing linkability attacks by reusing the ECIES secret k H N , which is used to protect SUPI in the initial step. In this protocol, the HN encrypts its randomly generated number RAND into RAND with k H N , then sending to the UE the encrypted result instead of RAND along with the authentication token AUTN. At this point, it is worth noting that since the UE trusts the freshness of k H N , it also trusts the freshness of RAND . Therefore, if successfully decrypting RAND with k H N , the UE can trust the freshness of its received AUTN, thereby detecting the message replay attack prior to arriving at the Sync_Failure while defending against the linkability attack. In spite of such a successful defense against the linkability attack, this protocol is vulnerable to active attacks by malicious SNs because it allows the HN to send K S E A F to the SN without authentication to the UE. More importantly, 5G-AKA fails to achieve forward secrecy because the old anchor keys can be recovered if the long-term key k shared between the UE and the HN is leaked.

3. Preliminaries

3.1. Notations

Table 1 shows abbreviations and notations to be used throughout this paper.

3.2. Elliptic Curve Integrated Encryption Scheme

The Elliptic Curve Integrated Encryption Scheme (ECIES) [24,25] is a well-known hybrid encryption scheme consisting of a Key Encapsulation Mechanism (KEM) and a Data Encapsulation Mechanism (DEM) where messages of arbitrary length can be encrypted. This scheme is a key component of 5G-AKA.
The ECIES-KEM has the following three algorithms:
  • KeyGen ( p p ) : On input of a public parameter p p , the algorithm outputs a public-private key pair ( P K , s k ) such that P K = s k · G , where p p is an elliptic curve parameter standardized in secp256r1 [26], and G p p is a base point.
  • Encap ( P K ) : On input of a public key P K , the algorithm generates an ephemeral public-private key pair ( R , r ) such that R = r · G , and then outputs a ciphertext C 0 = R and a shared key k s = KDF ( r · P K ) , where KDF is a key derivation function.
  • Decap ( s k , C 0 ) : On input of a ciphertext C 0 and a private key s k , the algorithm outputs the shared key k s = KDF ( s k · C 0 ) .
The ECIES-DEM has the following two algorithms:
  • SEnc ( k s , M ) : On input of a key k s and a message M, the algorithm first parses k s as k 1 | | k 2 , computes C 1 = ENC ( k 1 , M ) and C 2 = MAC ( k 2 , C 1 ) , and then outputs ( C 1 , C 2 ) , where ENC is an encryption part of a symmetric encryption scheme and MAC is a message authentication code.
  • SDec ( k s , ( C 1 , C 2 ) ) : On input of a ciphertext ( C 1 , C 2 ) and a key k s , the algorithm first parses k s as k 1 | | k 2 . If C 2 MAC ( k 2 , C 1 ) , it outputs ⊥. Otherwise, the algorithm outputs M = DEC ( k 1 , C 1 ) , where DEC is a decryption part of a symmetric encryption scheme.

4. A 5G-AKA Protocol for Forward Secrecy

In this section, we propose a 5G-AKA protocol for forward secrecy (for short, 5G-AKA-FS) that is compatible with the current 3GPP standards [3], and the proposed protocol is shown in Figure 2. Before executing the 5G-AKA-FS protocol, UE holds ( k ,   P K H N ,   S U P I , S Q N U E ) secretly and HN stores ( k ,   s k H N ,   I D H N ,   S Q N H N ) secretly. Also, SN stores I D S N . We denote by H SHA - 256 the SHA-256 cryptographic hash function.

4.1. The Initiation Phase: Step 1

In this phase, UE sends its SUPI as an encrypted form using ECIES [24,25] with HN’s public key P K H N . Correspondingly, HN decrypts SUCI with its private key s k H N . Upon successful completion of Step 1, we proceed to Step 2 by selecting the 5G-AKA-FS among various methods. Before choosing the authentication method, the Step 1 process unfolds as follows:

4.1.1. Step 1.1 (UE)

Step 1.1 (UE)
Inputs. With HN’s public key P K H N , UE executes the followings:
The Protocol:
  • Generate an ephemeral private-public key pair ( r , R ) such that R = r · G
  • With P K H N , compute a ciphertext C 0 = R and a key k U E = KDF ( r · P K H N )
  • Parse the shared key k U E as k 1 | | k 2
  • Compute C 1 = ENC ( k 1 , S U P I ) and C 2 = MAC ( k 2 , C 1 )
  • Set S U C I ( C 0 , C 1 , C 2 )
Outputs. UE sends ( S U C I ) to SN.

4.1.2. Step 1.2 (SN)

Step 1.2 (SN)
Inputs. SN receives ( S U C I ) from UE.
Outputs. SN sends ( S U C I , I D S N ) to HN.

4.1.3. Step 1.3 (HN)

Step 1.3 (HN)
Inputs. Upon receiving ( S U C I , I D S N ) from SN, HN executes the followings:
The Protocol:
  • Compute a shared key k H N = KDF ( s k H N · C 0 )
  • Parse the shared key k H N as k 1 | | k 2
  • Retrieve the corresponding k and S Q N H N from its database
Outputs. HN outputs ⊥ if C 2 MAC ( k 2 , C 1 ) . Otherwise, it outputs S U P I = DEC ( k 1 , C 1 ) .

4.2. The Challenge-Response Phase: Step 2

In this phase, UE and HN authenticate each other via a challenge-response method and establish anchor keys (i.e., K S E A F ) together with SN. A key idea is that we set a Diffie–Hellman public key Y as a random challenge RAND, and a Diffie–Hellman key D H K is used as a key material for forward secrecy. This phase uses a series of HMAC-SHA-256 cryptographic key derivation functions f 1 , f 2 , f 3 , f 4 , f 5 , f 1 , and f 5 , as specified by TS 33.501 [3] (see also Figure 3).

4.2.1. Step 2.1 (HN)

Step 2.1 (HN)
Inputs. Using S Q N H N , k, and D H K , HN generates an Authentication Vector S E - A V = ( R A N D , A U T N , H X R E S ) as follows:
The Protocol:
  • Generate an ephemeral private-public key pair ( y , Y ) such that Y = y · G
  • Compute a Diffie–Hellman key D H K = y · C 0
  • Set RAND Y as a challenge (The 128-bit randomness of R A N D is guaranteed since y is randomly chosen from the 128-bit key space. )
  • Compute M A C f 1 ( k , S Q N H N , A M F , R A N D D H K ) and
    an anonymous key A K f 5 ( k , R A N D D H K )
  • Set A U T N ( A K S Q N H N , A M F , M A C )
  • Compute C K f 3 ( k , R A N D D H K ) and I K f 4 ( k , R A N D D H K )
  • Compute expected responses X R E S f 2 ( k , R A N D D H K ) ,
    X R E S KDF ( C K | | I K , I D S N | | R A N D | | X R E S ) , and
    H X R E S LEFT ( 128 , H SHA - 256 ( R A N D | | X R E S ) )
  • Derive K A U S F KDF ( C K | | I K , I D S N | | A K S Q N H N | | D H K ) and
    K S E A F KDF ( K A U S F , I D S N )
  • Increase S Q N H N by 1 (i.e., S Q N H N S Q N H N + 1 )
  • Set H E - A V ( R A N D , A U T N , X R E S , K A U S F ) and S E - A V ( R A N D , A U T N , H X R E S )
Outputs. HN sends ( S E - A V ) to SN.

4.2.2. Step 2.2 (SN)

Step 2.2 (SN)
Inputs. SN receives ( S E - A V ) from HN and stores ( R A N D ,   H X R E S ) .
Outputs. SN sends ( R A N D , A U T N ) to UE.

4.2.3. Step 2.3 (UE)

Step 2.3 (UE)
Inputs. Upon receiving ( R A N D , A U T N ) from SN, UE executes the following steps:
  • In the UE, the ME forwards the received R A N D and A U T N to the SIM
  • The SIM computes a Diffie–Hellman key D H K = r · R A N D
  • Run the SIM card command AUTHENTICATE ( R A N D , D H K , A U T N )
  • Compute A K f 5 ( k , R A N D D H K )
  • Parse A U T N as ( C O N C , A M F , M A C )
  • De-conceal S Q N H N A K C O N C
  • Check f 1 ( k , S Q N H N , A M F , R A N D D H K ) = M A C
    • If this check does not pass, the SIM card returns ⊥ and then UE sends a failure message Mac_Failure to SN (see Case i)
    • Otherwise, proceed to the next step
  • Check S Q N U E < S Q N H N < S Q N U E + Δ  (The first condition S Q N U E < S Q N H N ensures the freshness of ( R A N D , A U T N ) . Also, the second condition S Q N H N < S Q N U E + Δ , which is optional in the non-normative Annex C of TS 33.102 [27], prevents a wrap-around of S Q N U E . For example, if Δ is too small (i.e., Δ = 2 ), an attacker can make a synchronization failure by sending S U C I computed by the attacker with a fake SUPI. After this attack, the honest UE and HN can no longer authenticate each other. In TS 33.102 [27], a recommended value of Δ is 2 28 so as to decrease the synchronization failure rate.)
    • If this check does not pass, the SIM card computes
      M A C f 1 ( k , S Q N U E , A M F , R A N D D H K ) and returns
      A U T S ( A K S Q N U E , A M F , M A C ) where A K f 5 ( k , R A N D D H K ) . Then, UE re-synchronizes with HN by sending a failure message Sync_Failure and A U T S to SN (see Case ii)
    • Otherwise, proceed to the next step
  • Set S Q N U E S Q N H N
  • Compute C K f 3 ( k , R A N D D H K ) and I K f 4 ( k , R A N D D H K )
  • Compute R E S f 2 ( k , R A N D D H K ) and SIM returns R E S , C K , and I K to ME
  • The ME calculates R E S KDF ( C K | | I K , I D S N | | R A N D | | R E S ) and derives K A U S F KDF ( C K | | I K , I D S N | | C O N C | | D H K ) and K S E A F KDF ( K A U S F , I D S N )
  • The UE returns ( K S E A F , R E S )
Outputs. The UE stores K S E A F and sends R E S to SN (see Case iii)
Case i 
(The SIM card returns): The UE sends a failure message Mac_Failure to SN.
Case ii 
(The SIM card returns  A U T S ): The UE re-synchronizes with HN by sending a failure message Sync_Failure and A U T S to SN. Upon receiving ( Sync _ Failure , A U T S ) , SN sends ( Sync _ Failure , A U T S , R A N D , S U C I ) to HN. Then, HN parses A U T S as ( A K S Q N U E , A M F , M A C ) , and de-conceals S Q N U E A K S Q N U E f 5 ( k , R A N D D H K ) . Next, HN checks its authenticity by comparing M A C = f 1 ( k , S Q N U E , A M F , R A N D D H K ) . If the check holds, HN re-sets S Q N H N by S Q N U E + 1 (i.e., S Q N H N S Q N U E + 1 ).
Case iii 
(The SIM card returns  ( K S E A F , R E S ) ): The UE stores K S E A F and sends ( R E S ) to SN. Upon receiving ( R E S ) , SN computes a hashed value H R E S LEFT ( 128 , H SHA - 256 ( R A N D | | R E S ) ) and checks its validity by comparing H R E S = H X R E S . If H R E S = H X R E S , SN forwards ( R E S ) to HN. Next, HN authenticates UE by comparing R E S = X R E S . If R E S = X R E S , HN sends its result and ( S U P I , K S E A F ) to SN. The SN continues the protocol only if both checks hold, and aborts the protocol otherwise. When all checks pass, UE and SN communicate with session keys derived from anchor keys (i.e., K S E A F ) in the subsequent 5G procedures. According to TS 33.501 [3], UE and SN should confirm the keys agreed and the identities of each other implicitly through the successful use of keys in subsequent procedures, which can be expressed by a key-confirmation round trip with K S E A F .

5. Formal Verification

To verify the security of the protocol, various formal verification methods are used as shown in Figure 4. Among several formal verification methods, the proposed protocol is verified through two methods: BAN Logic and ProVerif. BAN Logic is a representative method of Modal Logic and one of the widely used formal verification methods. With its decisiveness on the result, it can be fully trusted once the verification process is correct. However, each verification method has its pros and cons. BAN Logic does not consider dishonest reasoning. In other words, it cannot detect the attack of malicious participants. Thus, for precise verification results, we have included ProVerif as the second verification tool. ISO29129-1, a document for protocol verification framework, guides to formally verify the protocol using the automated prover [28]. ProVerif is one of the state-of-the-art verification tools that meets the guidelines. It can formally verify the protocol in an unbounded session environment and detect malicious attacks on the protocol. By using two complementary verification methods, BAN Logic and ProVerif, we have come up with reliable verification results.

5.1. Formal Verification via BAN Logic

The results of BAN Logic are driven by the idealization, assumption, goals, and derivation phase. The notations and rules of BAN Logic used in the above process are shown in Table 2 and Table 3. Excluding messages that are not encrypted, only messages protected by secret keys or secret information between communication participants, such as encryption, digital signature, and message authentication code are expressed. Second, in the Assumption step, preconditions for communication, such as network environment and home, are defined in a form that can be applied in BAN Logic. Third, in the goal step, the security goal to be required in the proposed protocol is defined. Finally, in the derivation step, it shows a series of processes to derive the security attributes defined in the goals through the BAN Logic rule. The results verified through BAN Logic in this paper are as follows.

5.1.1. The Initiation Phase: Step 1

The idealization form of the Initiation Phase of the protocol is shown below:
UE HN : SUPI , UE k 2 HN k 1
We added Assumptions (2) to (5) to verify through BAN Logic.
HN UE k 1 HN
HN # ( UE k 1 HN )
HN UE k 2 HN
HN # ( UE k 2 HN )
Technically, all the aforementioned assumptions could be invalidated as the HN inherently lacks trust in the UE’s public key PK U E . However, in the case of 5G AKA, since it was designed to tolerate a replay attack or Man-in-the-Middle (MITM) attack on the public key, we followed the standard and added the above assumption to continue this analysis.
Therefore, we set a security goal that HN believes that UE believes in SUPI, and derived this goal through the derivation step.
HN UE SUPI
from (1), and we derive
HN SUPI , UE k 2 HN k 2 , UE k 1 HN k 1 by ( 1 )
HN UE SUPI , UE k 2 HN k 2 , UE k 1 HN by ( 7 ) , ( 2 ) , MM
HN UE SUPI , UE k 2 HN by ( 8 ) , ( 3 ) , FR , NV , BC
HN UE SUPI by ( 9 ) , ( 4 ) , MM , ( 5 ) , FR , NV , BC
According to the derivation above, the proposed security protocol can achieve the security goal (6) stated in the goal. This means that the HN believes that UE believes about SUPI, in the initiation phase of the proposed protocol.

5.1.2. The Challenge-Response Phase: Step 2

The idealization form of the Challenge-Response Phase of the protocol is shown below:
HN UE : Y HN , S Q N H N A K , S Q N H N , AMF , Y HN , UE x · y · G HN , UE K S E A F HN k
UE SN : RES
UE HN : I D S N , Y HN , UE x · y · G HN , UE K S E A F SEAF k
HN SN : SUPI , UE K S E A F SEAF , UE UE K S E A F SEAF K N 12
Unlike HN in (14), in (13), due to no knowledge on k , SN treats RES as an unrecognized simple value. We added assumptions from (15)–(26) to derive the security goal.
UE UE K HN
UE X UE
UE # ( S Q N H N )
UE # ( K S E A F )
SN Y HN
SN H R E S , Y H N
HN UE K HN
HN # ( Y HN )
SN SN K N 12 HN
HN # ( SN K N 12 HN )
SN HN UE K S E A F SEAF
SN HN UE UE K S E A F SEAF
K S E A F is derived based on the ECIES ephemeral key pair performed once again in HN, and the UE can also derive K S E A F through the ECIES process. Therefore, since the UE can trust that K S E A F is fresh, (18) is added. Also, (19) and (20) are added because SN receives RAND = Y HN and HXRES from HN via secure channel and counts on HN.
UE HN Y HN
UE UE x · y · G HN
UE HN UE x · y · G HN
UE UE K S E A F HN
UE HN UE K S E A F SEAF
HN UE UE x · y · G HN
HN UE UE K S E A F HN
SN HN UE K S E A F SEAF
SN UE UE K S E A F SEAF
from (11), we derive
UE Y HN by ( 11 )
Here, given the ephemeral ECIES public key of HN, UE derives DHK = x · Y = x · y · G and then computes A K = f 5 k , Y x · y · G . At this point, despite no trust in Y , UE can be sure that AK is a good key shared between HN and itself. This is because AK is derived by inputting k and x where k is only known to both UE and HN and x is its own fresh ephemeral ECIES private key. As a result, UE gains the belief (37) as follows.
UE UE A K HN by ( 36 ) , ( 15 ) , ( 16 )
UE S Q N H N A K by ( 11 )
UE HN S Q N H N by ( 38 ) , ( 37 ) , MM , ( 20 ) , NV
Note that after recovery, SQN H N is checked for its freshness. For this procedure, we add the assumption (17). Now, UE possesses the valid SQN H N .
UE S Q N H N , A M F , Y HN , UE K S E A F SEAF k by ( 11 )
UE HN S Q N H N , A M F , Y HN , UE K S E A F SEAF by ( 40 ) , ( 15 ) , MM
UE HN S Q N H N , A M F , Y HN , UE K S E A F SEAF by ( 41 ) , ( 18 ) , FR , NV
UE HN Y HN by ( 11 )
Even if RAND and AUTN are replayed, a linkability attack does not occur in the UE. Because freshness is verified based on the key derived through ECIES rather than SQN H N during MAC check, when a replay attack occurs, the Sync_Failure step is not performed, and MAC_Failure is executed to stop authentication, so unlinkability is supported.
In addition, UE obtains the indirect belief on  Y HN , which helps this protocol to defend against the Man-in-The-Middle attacks. Based on (43), UE proceeds to gain the direct belief on UE x · y · G HN as follows.
UE UE x · y · G HN by ( 43 ) , ( 16 ) , DH
UE HN UE x · y · G HN by ( 42 ) , BC
UE derives K S E A F with the values k , SQN H N , Y , x · y · G , ID S N . In particular, based on (15), (17), (43), and (44), UE can arrive at the following belief.
UE UE K S E A F HN by ( 25 ) , ( 18 ) , ( 43 ) , ( 44 )
UE HN UE K S E A F SEAF by ( 42 ) , BC
At this point, it is confirmed from (44) to (47) that HN is authenticated to UE.
from (12), and we derive
SN RES by ( 12 )
SN RES by ( 48 ) , ( 18 ) , ( 19 ) , HR
Based on (49), SN proceeds this protocol by forwarding RES to HN .
from (13), and we derive
HN ID S N , Y HN , UE x · y · G HN , UE K S E A F HN k by ( 13 )
HN UE ID S N , Y HN , UE x · y · G HN , UE K S E A F HN by ( 50 ) , ( 21 ) , MM , ( 22 ) , FR , NV
HN UE UE x · y · G HN by ( 51 ) , BC
HN UE UE K S E A F HN by ( 51 ) , BC
Based on (51), UE and HN mutually authenticate
from (14), and we derive
SN SUPI , UE K S E A F HN , UE K S E A F SEAF K N 12 by ( 14 )
SN HN SUPI , UE K S E A F HN , UE UE K S E A F SEAF by ( 54 ) , ( 23 ) , MM , ( 24 ) , FR , NV
SN HN UE K S E A F SEAF by ( 55 ) , BC
SN UE K S E A F SEAF by ( 56 ) , ( 25 ) , JR
SN HN UE UE K S E A F SEAF by ( 55 ) , BC
SN UE UE K S E A F SEAF by ( 58 ) , ( 26 ) , JR

5.2. Formal Verification via ProVerif

5.2.1. Implementations and designs

In this section, we formally verify the 5G-AKA-FS protocol using a well-known formal verification tool, ProVerif [23]. We designed the processes of User Equipment (UE), Serving Network (SN), and Home Network (HN) respectively at UE, SN and HN in ProVerif to verify its security properties. Our implementation also contains the process protocol that concludes the proof.
We implemented the processes under Dolev–Yao’s attacker model, where the attacker can access the encrypted data only if it has the correct key to decrypt them. We largely adopt the settings that the implementation of Damir et al. [29] is based on. The differences between ours and Damir et al. are as follows:
  • First, we newly define the symbolic process DHkey for the perfect forward secrecy, that is the Diffie–Hellman Key exchange protocol, in the implementation.
  • Although our settings are similar to Damir et al. [29], the actual internal processes are different as the internal processes of UE, SN, and HN are fairly different from those of Damir et al.’s protocol. We implement those differences in our implementation.
Under Dolev–Yao’s attacker model, we simplify some cryptographic primitives as symbolic functions. Particularly, the Diffie–Hellman key exchange protocol can be implemented as a symbolic function as follows:
DH Key Exchange protocol
  • type pubKey.
  • type secKey.
  • fun pk(secKey):pubKey.
  • fun DHkey(secKey,pubKey):bitstring.
  • equation forall sk1:secKey, sk2:secKey;
  • DHKey(sk2,pk(sk1))=DHKey(sk1,pk(sk2)).
For the symmetric key encryption/decryption, we utilized a symbolic function defined in [29] to implement the protocols in our 5G-AKA-FS. Symmetric key encryption/decryption means that a message m is encrypted by senc using a secret key n. Then, the encrypted message senc(m,n) only can be decrypted using sdec with the same key. It is defined as follows:
Encryption/Decryption
  • fun senc(bitstring,bitstring):bitstring.
  • reduc forall m:bitstring,n:bitstring;
  • sdec(senc(m,n),n)=m.

5.2.2. Protocol Process

We processed our protocol for the verification. We define the public key of HN using its corresponding private key, skHN, and the public key is broadcasted to all public channels as it is a public parameter. We composited infinite replication of UE, SN and HN processes in parallel for protocol processes.
Protocol Process
  • process
  • new skHN :secKey;
  • new uk :bitstring;
  • new idHN :bitstring;
  • new SNname :bitstring;
  • new SQNUE :bitstring;
  • new delta :bitstring;
  • new SUPI :bitstring;
  • let pkHN = pk(skHN) in out(usch1, (pkHN));
  • out(usch2, (pkHN));
  • out(usch3, (pkHN));
  • (!UE(SUPI,idHN,pkHN,uk,SNname,SQNUE,delta)|
  • !SN(SNname)|!HN(skHN,idHN))

5.2.3. Assertions

Using ProVerif, we can verify if the adversary can access the security parameters by reaching the state where those parameters are available. In our protocol, the private key of HN (skHN), a Long-term key at UE/HN (uk), and the Long-term identity (SUPI) were queried to verify their secrecy.
Secrecy of Parameters
  • query attacker(skHN).
  • query attacker(uk).
  • query attacker(SUPI).
The sequence of the protocol can also be verified by modeling how the messages are processed and exchanged among UE, SN and HN. Those can be verified using assertions consisting of events that represent message processing and delivery. We utilize the same naming rules for events with [29]. Therefore, for a query x, we formally define events as follows:
  • event UESendReqSN(·): UE sends a connection request with the required parameters to SN in Step 1.1.
  • event SNRecReqUE(·): SN receives a connection request with the required parameters from UE in Step 1.2.
  • event SNSendReqHN(·): SN sends a connection request with the required parameters to HN in Step 1.2.
  • event HNRecReqSN(·): HN receives the result of a connection request with the other relevant parameters from SN in Step 1.3.
  • event HNSendResSN(·): HN sends the result of a connection request with the other relevant parameters to SN in Step 2.1.
  • event SNRecResHN(·): SN receives the result of a connection request with the other relevant parameters from HN in Step 2.2.
  • event SNSendResUE(·): SN sends the result of a connection request with the other relevant parameters to HN in Step 2.2.
  • event UERecResSN(·): UE receives the result of a connection request with the other relevant parameters from SN in Step 2.3.
  • event UESendConSN(·): UE sends authentication parameters to SN in Case iii in Step 2.3.
  • event SNSendConHN(·): SN forwards ( R E S ) to HN in Case iii in Step 2.3.
  • event SNRecConUE(·): SN receives ( R E S ) from UE Case iii in Step 2.3.
  • event HNRecConSN(·): HN receives ( R E S ) from SN Case iii in Step 2.3.
  • event HNSendSUPISN(·): HN sends ( S U P I , K S E A F ) to SN in Case iii in Step 2.3.
  • event SNRecSUPIHN(·): SN receives ( S U P I , K S E A F ) from HN in Case iii in Step 2.3.
Using the events described above, we can formally verify the hypothesis “event A ==> event B”, which means that, without the execution of event B, event A cannot be executed. For example, the first two lines of the following ProVerif code of Process Verification imply that SN sends a connection request with the required parameters to HN only if HN receives the result of a connection request with the other relevant parameters from SN.
The following are the all events we verified in the implementation.
Process Verification
  • query a:bitstring,b:bitstring;
  • event(HNRecReqSN(a))  ==>   event(SNSendReqHN(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecResHN(a))  ==>   event(HNSendResSN(b)).
  • query a:bitstring,b:bitstring;
  • event(UERecResSN(a))   ==>   event(SNSendResUE(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecConUE(a))   ==>  event(UESendConSN(b)).
  • query a:bitstring,b:bitstring;
  • event(HNRecConSN(a))   ==>   event(SNSendConHN(b)).
  • query a:bitstring,b:bitstring;
  • event(SNRecSUPIHN(a))   ==>   event(HNSendSUPISN(b)).

5.2.4. Verification Results

We execute our ProVerif code on the ProVerif online demo website. As a result of the verification, we can conclude that the attacker cannot access the security keys in any state of the process. Moreover, all the sequences of executions of UE, SN, and HN are verified as defined in the protocol.
The summary of the verification results is as follows:
Verification Summary
  • Query not attacker(skHN[]) is true.
  • Query not attacker(uk[]) is true.
  • Query not attacker(SUPI[]) is true.
  • Query event(HNRecReqSN(a))  ==>   event(SNSendReqHN(b)) is true.
  • Query event(SNRecResHN(a))  ==>   event(HNSendResSN(b)) is true.
  • Query event(UERecResSN(a))  ==>   event(SNSendResUE(b)) is true.
  • Query event(SNRecConUE(a))  ==>   event(UESendConSN(b)) is true.
  • Query event(HNRecConSN(a))  ==>   event(SNSendConHN(b)) is true.
  • Query event(SNRecSUPIHN(a))  ==>   event(HNSendSUPISN(b)) is true.

6. Comparative Analysis

In this section, we conduct a comparative assessment aimed at evaluating the effectiveness of the proposed protocol by considering security requirements as well as the computational and communication overheads. For a starter, six protocols are compared against six security requirements to assess the degree of security they each offer. This analysis showcases that the proposed protocol delivers robust security measures in comparison to the others.
Next, we proceed to determine the computational overhead linked to each protocol. This involves scrutinizing the amount of cryptographic operations required within each security protocol and quantifying the computational overhead through Python. We also evaluate the communication overhead by closely examining the message dimensions described in the 3GPP standard document [3]. For that, the transmitted messages are not only inspected, but also their bit sizes are calculated to measure the communication overhead caused by each protocol.

6.1. Security Analysis

The proposed security protocol is compared to the existing protocols based on six security requirements: 5G Network and UE’s Mutual Authentication (AUTH), Secure Key Exchange (SKE), Legacy USIM Compatibility Support (LUCS), LinkaBility Attack (LBA), Active attack by Malicious SN (AMS), and Forward Secrecy for K S E A F (FS). The security requirements that each protocol satisfies are shown in Table 4.
According to the table, all protocols satisfy the requirements for AUTH as well as SKE. However, LUCS is not supported by 5G-IPAKA and 5GAKA-LCCO. 5G-IPAKA introduces a different structure, which may result in compatibility issues. Similarly, 5GAKA-LCCO deviates from the standard by utilizing T S N and follows an unconventional protocol flow, potentially leading to compatibility problems with previous versions, i.e., reverse compatibility problems.
LBA is an attack related to compromising a UE’s location privacy. 5GAKA-LCCO eliminates the process of synchronization failure by reducing round-trip, thus preventing LBA. In the case of 5G-AKA , k H N is reused instead of SQN , which enables it to confirm the freshness of MAC and address LBA. On the other hand, 5G-AKA-FS can defend against LBA because it computes DHK in HN and reflects this key when generating values required for authentication.
In 5G-IPAKA and 5G-AKA , active attacks by malicious SN are possible because the HN delivers K S E A F to the SN without authentication of the UE. 5G-AKA, SUCI-AKA, and 5G-AKA derive the anchor key K S E A F through the long-term key k , so FS is not supported when k is leaked. 5G-IPAKA and 5GAKA-LCCO used not only k but also HN’s private key sk H N to support FS. However, if sk H N is compromised, FS for K S E A F in the past is not achieved.

6.2. Overhead Analysis

To compare the trade-off between security and resource consumption, we have compared the proposed protocol computation and communication overhead. SUCI-AKA, 5G-IPAKA, 5GAKA-LCCO, and 5G-AKA′ are other protocols improvised based on 5G-AKA. However, they do not provide complete FS. EAP-TLS1.3 and EAP-AKA′-FS are both representative protocols on the mobile network field and provide complete FS. The test results provide respectful data for a trade-off between security and resource consumption.

6.2.1. Computation Overhead

Table 5 summarizes the environment used in the experiment. The computation overhead for each protocol was measured by conducting 5000 test runs using the cryptography library in Python 3.10.11.
As can be seen in a test result shown in Figure 5, 5G-AKA-related protocols have minor differences with 5G-AKA computation overhead. However, these protocols do not completely provide FS. The proposed protocol, with a computation overhead of 6.75 ms, provides FS and has resistance against LBA and AMS. Moreover, as can be seen in comparison with EAP-TLS1.3 and EAP-AKA′-FS, the increase in computation overhead for providing FS in the proposed protocol is low.
The majority of the computation overhead is incurred by ECDH (Elliptic Curve Diffie–Hellman) and digital signature. To provide FS, the protocol must generate a fresh key every session, which 5G-AKA does not do on the HN side, so an increase in overhead to provide FS on protocols is mostly caused by adding fresh ECDH in the key generation phase. In EAP-AKA′-FS, HN and UE generate fresh ECDH keys in the challenge-response phase. However, the proposed protocol, with the reuse of the fresh ECDH key generated in the initiation phase. In Step 1.1, the proposed protocol computation overhead is optimized. Moreover, unlike EAP-TLS1.3, by a succession of 5G-AKA architecture, the proposed protocol does not require a digital signature. These are the reasons the proposed protocol has lower computation overhead than EAP-TLS1.3 and EAP-AKA′-FS. Considering that our proposed protocol provides strong security, this level of computational overhead is deemed acceptable. It represents a trade-off that we are willing to accept to prioritize robust security.

6.2.2. Communication Overhead

Communication overhead refers to the total message size that needs to be transferred in the network for a specific purpose. Based on the 3GPP 33.501 specification, we have analyzed the total size of the messages that are exchanged through the primary authentication phase. Table 6 refers to the size of the messages that consist of the 5G primary authentication phase.
The combination of upper messages concludes the total communication overhead of the 5G-AKA. Table 7 gives the total communication overhead of 5G-AKA, improved protocols, and for practical comparison EAP-TLS1.3 and EAP-AKA′-FS.
For one protocol to offer additional security properties and inherit the structure of 5G-AKA, it is most likely to use additional messages to fulfill that purpose. As a result, 5G-AKA-FS leads to a higher communication overhead than 5G-AKA. However, as compensation for this sacrifice, i.e., additional overhead, the proposed protocol offers forward secrecy by newly generating the HN’s ephemeral ECDH public key and using it as RAND in the initialization phase. Note that in 5G-AKA RAND is a 128-bit random challenge, but in 5G-AKA-FS the RAND challenge is replaced with the HN’s ephemeral ECDH public key, which is 256-bit. This results in 5G-AKA-FS having 384-bit higher communication overhead than 5G-AKA. With only 384-bit extra messages traveling through the network, 5G-AKA-FS achieves resistance against LBA and AMS and provides FS. Among 5G-AKA-related protocols, 5G-AKA-FS is the only improvised protocol that offers all three security properties. Furthermore, despite its increase, the overhead of 5G-AKA-FS remains lower than that of the EAP-TLS-1.3 protocol and EAP-AKA′-FS. The analysis results indicate that the addition of 384 extra bits for three crucial security properties are reasonably justifiable trade-offs.

7. Further Discussions

The proposed protocol has both advantages on security properties and overheads. However, implementing 5G-AKA-FS presents another challenge. While it is USIM compatible and does not require hardware exchange, software updates are required on both the UE and the 5G Core. Given that the 5G network serves as the infrastructure for connecting a massive number of devices, testing, and simulation are essential before the updates.
As for security properties, the proposed 5G-AKA-FS protocol has several limitations. For example, our protocol does not provide resistance to key compromise impersonation attacks since an attacker who obtains a permanent key k from HN can easily impersonate UE. Also, the proposed protocol does not guarantee security against ephemeral key leakage (e.g., due to side-channel attacks) because the exposure of r breaks UE anonymity. Additionally, the security of the proposed protocol relies on the safety of the cryptographic key exchange function ECDH. However, the emergence of quantum computing poses a threat to the security of legacy cryptographic algorithms including ECDH. Therefore, future research on quantum-resistant AKA using Post-Quantum Cryptography is required.

8. Conclusions

In this paper, we proposed an improved 5G-AKA (5G-AKA-FS) protocol that provides UE unlinkability and forward secrecy, and is compatible with the 3GPP standard. Implementing the proposed protocol will require the update on UE and 5G Core. However, since it is compatible with the original 5G-AKA it only needs minor software updates. Also, we proved that the 5G-AKA-FS protocol is valid by using formal verification tools BAN Logic and ProVerif. Moreover, we compared the security properties and computation/communication overheads of our 5G-AKA-FS to those of the other existing protocols, including 5G-AKA, SUCI-AKA, 5G-AKA′, 5G-IPAKA, 5GAKA-LCCO, EAP-TLS 1.3, and EAP-AKA′-FS. This comparative analysis demonstrates that the proposed protocol effectively maintains a balance between security and efficiency.

Author Contributions

Conceptualization, I.Y. and S.S.; methodology, I.Y., S.S., J.K. and J.B.; software, G.K., H.K. and J.K.; validation, I.Y., G.K. and J.K.; formal analysis, I.Y., G.K., J.K. and J.B.; investigation, I.Y. and S.S.; writing—original draft preparation, I.Y., G.K., S.S., H.K. and J.K.; writing—review and editing, I.Y., G.K., S.S., H.K., J.K. and J.B.; visualization, G.K. and H.K.; supervision, I.Y.; funding acquisition, I.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 2022-00207416, A study on PQC optimization and security protocol migration to neutralize advanced quantum attacks in Beyond 5G-based next-generation IoT computing environments, 100%).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. European 5G Performance Trails its International Peers. Available online: https://www.gsma.com/membership/resources/european-5g-performance-trails-its-international-peers/ (accessed on 10 December 2023).
  2. Henry, S.; Alsohaily, A.; Sousa, E.S. 5G is real: Evaluating the compliance of the 3GPP 5G new radio system with the ITU IMT-2020 requirements. IEEE Access 2020, 8, 42828–42840. [Google Scholar] [CrossRef]
  3. 3GPP. Security Architecture and Procedures for 5G System TS33.501 v18.2.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169 (accessed on 10 December 2023).
  4. 3GPP. 3GPP System Architecture Evolution (SAE)—Security Architecture (Release 17) TS33.401 V17.4.0. Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296 (accessed on 10 December 2023).
  5. Arkko, J.; Lehtovirta, V.; Eronen, P. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA′). Technical Report. 2009. Available online: https://www.rfc-editor.org/info/rfc5448 (accessed on 10 December 2023). [CrossRef]
  6. Arkko, J.; Haverinen, H. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). Technical Report. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4187 (accessed on 10 December 2023).
  7. Jover, R.P.; Marojevic, V. Security and protocol exploit analysis of the 5G specifications. IEEE Access 2019, 7, 24956–24963. [Google Scholar] [CrossRef]
  8. Kunz, A.; Zhang, X. New 3GPP security features in 5G phase 1. In Proceedings of the 4st IEEE Conference on Standards for Communications and Networkin (CSCN ’18), Paris, France, 29–31 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar] [CrossRef]
  9. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 2019, 22, 196–248. [Google Scholar] [CrossRef]
  10. Liu, F.; Peng, J.; Zuo, M. Toward a secure access to 5G network. In Proceedings of the 17st IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ’18)/12th IEEE Conference On Big Data Science And Engineering (TrustCom/BigDataSE ’18), New York, NY, USA, 1–3 August 2018; pp. 1121–1128. [Google Scholar] [CrossRef]
  11. Hussain, S.R.; Echeverria, M.; Karim, I.; Chowdhury, O.; Bertino, E. 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. In Proceedings of the 26st ACM SIGSAC Conference on Computer and Communications Security (CCS’19), London, UK, 11–15 November 2019; ACM Press: New York, NY, USA, 2019; pp. 669–684. [Google Scholar] [CrossRef]
  12. Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmanos, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef]
  13. Basin, D.; Dreier, J.; Hirschi, L.; Radomirovic, S.; Sasse, R.; Stettler, V. A formal analysis of 5G authentication. In Proceedings of the 25st ACM SIGSAC Conference on Computer and Communications Security (CCS’18), Toronto, ON, Canada, 15–19 October 2018; ACM Press: New York, NY, USA, 2018; pp. 1383–1396. [Google Scholar] [CrossRef]
  14. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Gurtov, A.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutorials 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  15. Xiao, Y.; Gao, S. Formal verification and analysis of 5G AKA protocol using mixed strand space model. Electronics 2022, 11, 1333. [Google Scholar] [CrossRef]
  16. Wang, Y.; Zhang, Z.; Xie, Y. Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. In Proceedings of the 30th USENIX Security Symposium (USENIX Security ’21), Online, 11–13 August 2021; USENIX Association: Vancouver, BC, Canada, 2021; pp. 3595–3612. Available online: https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen (accessed on 10 December 2023).
  17. Xiao, Y.; Wu, Y. 5G-IPAKA: An improved primary authentication and key agreement protocol for 5g networks. Information 2022, 13, 125. [Google Scholar] [CrossRef]
  18. 3GPP. Authentication and Key Management for Applications (AKMA) Based on 3GPP Credentials in the 5G System (5GS) TS 33.535 (Release 18). Technical Report, The 3rd Generation Partnership Project. 2023. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3690 (accessed on 10 December 2023).
  19. Arkko, J.; Norrman, K.; Mattsson, J.P. Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA′ FS). Internet-Draft draft-ietf-emu-aka-pfs-11, Internet Engineering Task Force. 2023. Available online: https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/11/ (accessed on 10 December 2023).
  20. Køien, G.M. The SUCI-AKA Authentication Protocol for 5G Systems. In Proceedings of the 13rd NISK Conference on Norwegian Information Security (NISK’20), Online, 23–25 November 2020; Available online: https://ojs.bibsys.no/index.php/NIK/article/view/885 (accessed on 10 December 2023).
  21. Xiao, Y.; Gao, S. 5GAKA-LCCO: A secure 5G authentication and key agreement protocol with less communication and computation overhead. Information 2022, 13, 257. [Google Scholar] [CrossRef]
  22. Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. (TOCS) 1990, 8, 18–36. [Google Scholar] [CrossRef]
  23. Blanchet, B.; Smyth, B.; Cheval, V.; Sylvestre, M. ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. Proverif User Manual. 2021. Available online: https://bblanche.gitlabpages.inria.fr/proverif/manual.pdf (accessed on 10 December 2023).
  24. Shoup, V. A Proposal for an ISO Standard for Public Key Encryption. Cryptology ePrint Archive, Paper 2001/112. 2001. Available online: https://eprint.iacr.org/2001/112 (accessed on 10 December 2023).
  25. Research, C. SEC 1: Elliptic Curve Cryptography. Standards for Efficient Cryptography. 2009. Available online: https://www.secg.org/sec1-v2.pdf (accessed on 10 December 2023).
  26. Research, C. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography. 2010. Available online: https://www.secg.org/sec2-v2.pdf (accessed on 10 December 2023).
  27. 3GPP. 3G Security Architecture TS 33.102 (Release 16). Technical Report, The 3rd Generation Partnership Project. 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2262 (accessed on 10 December 2023).
  28. ISO. ISO/IEC 29128-1:2023 Information Security, Cybersecurity and Privacy Protection—Verification of Cryptographic Protocols—Part 1: Framework. Technical Report, the International Organization for Standardization. 2023. Available online: https://standards.iteh.ai/catalog/standards/iso/5a8c7c4d-434f-4816-a4e0-b33660dd311c/iso-iec-29128-1-2023 (accessed on 10 December 2023).
  29. Damir, M.T.; Meskanen, T.; Ramezanian, S.; Niemi, V. A Beyond-5G Authentication and Key Agreement Protocol. In Proceedings of the Network and System Security—16th International Conference, NSS 2022, Denarau Island, Fiji, 9–12 December 2022; Springer: Berlin/Heidelberg, Germany, 2022; Volume 13787, pp. 249–264. [Google Scholar] [CrossRef]
Figure 1. 3GPP 5G security architecture.
Figure 1. 3GPP 5G security architecture.
Sensors 24 00159 g001
Figure 2. The 5G-AKA-FS protocol.
Figure 2. The 5G-AKA-FS protocol.
Sensors 24 00159 g002
Figure 3. Computations of M A C , X R E S , C K , I K , A K , and K A U S F in 5G-AKA-FS.
Figure 3. Computations of M A C , X R E S , C K , I K , A K , and K A U S F in 5G-AKA-FS.
Sensors 24 00159 g003
Figure 4. Types of formal verification.
Figure 4. Types of formal verification.
Sensors 24 00159 g004
Figure 5. Total Computation Overhead.
Figure 5. Total Computation Overhead.
Sensors 24 00159 g005
Table 1. Abbreviations and notations.
Table 1. Abbreviations and notations.
Meanings
HNHome Network
UE (ME, SIM)User Equipment (Mobile Equipment, Subscriber Identity Modules)
SNServing Network
SUPISUbscriber Permanent Identifier
SUCISUbscriber Concealed Identifier
KEMKey Encapsulation Mechanism
DEMData Encapsulation Mechanism
AMFAccess Management Function
AUSFAuthentication Server Function
SEAFSEcurity Anchor Function
kA permanent key shared between UE and HN
K A U S F A master session key derived from 5G-AKA-FS
K S E A F An anchor key derived from 5G-AKA-FS
k U E UE’s shared key established by ECIES-KEM
k H N HN’s shared key established by ECIES-KEM
( P K H N , s k H N ) HN’s ECIES public-private key pair where P K H N = s k H N · G
I D S N Unique identifier of SN
I D H N Unique identifier of HN
S Q N U E UE’s sequence number
S Q N H N HN’s sequence number
R A N D HN’s challenge message
AUTHMutual AUTHentication
SKESecure Key Exchange
LUCSLegacy USIM Compatibility Support
LBALinkaBility Attack
AMSActive attack by Malicious SN
FSForward Secrecy
Table 2. Notations of BAN Logic.
Table 2. Notations of BAN Logic.
NotationMeaning
P X P believes the message X
P X P receives the message X
P X P previously sent the message X
P X P has authority over X
# ( X ) The message X is fresh
X K X is combined with a secret K
{ X } K X is encrypted with a key K
P K Q K is a secret key shared between P and Q
K P K is the public key of P
P K Q K is a shared secret between P and Q
Table 3. Rules of BAN Logic.
Table 3. Rules of BAN Logic.
RuleFormula
Message Meaning Rule (MM) P P K Q , P { X } K P Q X
P P K Q , P X K P Q X
P K Q , P { X } Q 1 P Q X
Nonce Verification Rule (NV) P # ( X ) , P Q X P Q X
Jurisdiction Rule (JR) P Q X , P Q X P X
Freshness Rule (FR) P # ( X ) P # ( X , Y )
Decomposition Rule (DR) P ( X , Y ) P X
Belief Conjunction Rule (BC) P X , P Y P ( X , Y ) P Q ( X , Y ) P Q X
P Q ( X , Y ) P Q X
Hash Rule (HR) P Q H ( X ) , P X P Q X
Diffie–Hellman Rule P Q g Y Q , P g X P P P g X Y Q
P Q g Y Q , P g X P P P g X Y Q
Table 4. Comparison in terms of security requirements with existing protocols.
Table 4. Comparison in terms of security requirements with existing protocols.
ProtocolSecurity Requirements
AUTHSKELUCSLBAAMSFS
5G-AKA [3]××
SUCI-AKA [20]××
5G-IPAKA [17]××××
5GAKA-LCCO [21]××
5G-AKA [16]××
EAP-TLS1.3×
EAP-AKA -FS
5G-AKA-FS
◯: Support; ×: Not support;
Table 5. Experimental environments.
Table 5. Experimental environments.
Operating SystemWindows 11
CPU12th Gen Intel(R) Core(TM) i7-12700KF
GPUNVIDIA GeForce RTX 3070 Ti
RAMDDR4 64.0GB
Program LanguagePython 3.10.11
LibraryCryptography
Table 6. 5G-AKA message size.
Table 6. 5G-AKA message size.
MessageSUCISNN(SN-Name)5G HE AV5G SE AVAUTNSUPI
Bits53625664038412860
Table 7. Communication Overhead.
Table 7. Communication Overhead.
ProtocolUE (Bits)Core (Bits)Total (Bits)
5G-AKA92031124032
SUCI-AKA104833684416
5G-IPAKA111222684480
5G-LCCO-AKA98431764224
5G-AKA 92031124032
EAP-TLS 1.35520526410,784
EAP-AKA′-FS206835005568
5G-AKA-FS104833684416
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

You, I.; Kim, G.; Shin, S.; Kwon, H.; Kim, J.; Baek, J. 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy. Sensors 2024, 24, 159. https://doi.org/10.3390/s24010159

AMA Style

You I, Kim G, Shin S, Kwon H, Kim J, Baek J. 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy. Sensors. 2024; 24(1):159. https://doi.org/10.3390/s24010159

Chicago/Turabian Style

You, Ilsun, Gunwoo Kim, Seonghan Shin, Hoseok Kwon, Jongkil Kim, and Joonsang Baek. 2024. "5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy" Sensors 24, no. 1: 159. https://doi.org/10.3390/s24010159

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop