loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Rosario Giustolisi and Christian Gehrmann

Affiliation: Swedish Institute of Computer Science, Sweden

ISBN: 978-989-758-196-0

Keyword(s): 5G, Internet of Things, AKA, EPS-AKA, LTE, Threat Model, Threat Analysis, Security Analysis.

Related Ontology Subjects/Areas/Topics: Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Network Security ; Security and Privacy in Mobile Systems ; Security Protocols ; Wireless Network Security

Abstract: The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.231.228.109

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Giustolisi, R. and Gehrmann, C. (2016). Threats to 5G Group-based Authentication.In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 360-367. DOI: 10.5220/0005996203600367

@conference{secrypt16,
author={Rosario Giustolisi. and Christian Gehrmann.},
title={Threats to 5G Group-based Authentication},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={360-367},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005996203600367},
isbn={978-989-758-196-0},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Threats to 5G Group-based Authentication
SN - 978-989-758-196-0
AU - Giustolisi, R.
AU - Gehrmann, C.
PY - 2016
SP - 360
EP - 367
DO - 10.5220/0005996203600367

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.