Threats to 5G group-based authentication

Rosario Giustolisi, Christian Gehrmann

Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceedingPeer review

Sammanfattning

The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.

Originalspråkengelska
Titel på värdpublikationICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
RedaktörerChristian Callegari, Marten van Sinderen, Enrique Cabello, Pierangela Samarati, Pascal Lorenz, Mohammad S. Obaidat, Panagiotis Sarigiannidis
FörlagSciTePress
Sidor360-367
Antal sidor8
Volym4
ISBN (elektroniskt)9789897581960
DOI
StatusPublished - 2016 juli 26
Externt publiceradJa
Evenemang13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016 - Lisbon, Portugal
Varaktighet: 2016 juli 262016 juli 28

Konferens

Konferens13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016
Land/TerritoriumPortugal
OrtLisbon
Period2016/07/262016/07/28

Ämnesklassifikation (UKÄ)

  • Kommunikationssystem

Fingeravtryck

Utforska forskningsämnen för ”Threats to 5G group-based authentication”. Tillsammans bildar de ett unikt fingeravtryck.

Citera det här