Pub Date : 2021-12-20DOI: 10.1109/scc53769.2021.9768338
V. O. Nyangaresi, Z. A. Abduljabbar, Z. Abduljabbar
Security and privacy issues in 5G networks center around traceability, de-synchronization, impersonation, man-in-the-middle, linkability, message replays among others. Although 5G authentication and key agreement (5G-AKA), Extensible Authentication Protocol AKA (EAP-AKA) and EAP Transport Layer Security (EAP-TLS) have been introduced to boost security in these networks, numerous security flaws have been identified in these protocols that render them vulnerable. As such, there has been extensive research on alternative protocols to address these issues. However, the presented protocols still have many security and performance gaps. In this paper, hash signature based AKA protocol is developed. Its security evaluation shows that it is robust against several 5G attacks. It also has the lowest computation and communication overheads compared with the other related approaches.
{"title":"Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks","authors":"V. O. Nyangaresi, Z. A. Abduljabbar, Z. Abduljabbar","doi":"10.1109/scc53769.2021.9768338","DOIUrl":"https://doi.org/10.1109/scc53769.2021.9768338","url":null,"abstract":"Security and privacy issues in 5G networks center around traceability, de-synchronization, impersonation, man-in-the-middle, linkability, message replays among others. Although 5G authentication and key agreement (5G-AKA), Extensible Authentication Protocol AKA (EAP-AKA) and EAP Transport Layer Security (EAP-TLS) have been introduced to boost security in these networks, numerous security flaws have been identified in these protocols that render them vulnerable. As such, there has been extensive research on alternative protocols to address these issues. However, the presented protocols still have many security and performance gaps. In this paper, hash signature based AKA protocol is developed. Its security evaluation shows that it is robust against several 5G attacks. It also has the lowest computation and communication overheads compared with the other related approaches.","PeriodicalId":365845,"journal":{"name":"2021 IEEE 2nd International Conference on Signal, Control and Communication (SCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}