Javascript must be enabled to continue!
Security and Privacy Issues in 5G Authentication and Key Agreement (AKA) Protocol
View through CrossRef
5G is the fastest-growing generation and the future of telecommunications. In the following years, when it is completely developed, it will be used by a large number of individuals all over the world. But 5G has a lot of security and privacy issues. As a result, it's critical to properly identify existing security weaknesses and provide effective solutions to address them. Some security and privacy issues still exist in the standard 5G AKA protocol, which have been identified and addressed in recent literature. By taking advantage of those vulnerabilities of the protocol, an adversary can perform some attacks such as SUCI replay attack, parallel session attack, linkability attack, etc. As a result, this standard protocol cannot ensure the location confidentiality of the subscriber. In the recent literature, researchers have provided some effective ways to mitigate the vulnerabilities of the protocol. However, the standard 5G AKA protocol still has a number of security issues that are either partially or entirely unsolved. In this paper, those issues have been addressed, and a security-enhanced 5G AKA protocol has been proposed which can mitigate the vulnerabilities of the AKA protocol. The proposed protocol may now be able to prevent such attacks and ensure the location confidentiality of the subscriber.
Title: Security and Privacy Issues in 5G Authentication and Key Agreement (AKA) Protocol
Description:
5G is the fastest-growing generation and the future of telecommunications.
In the following years, when it is completely developed, it will be used by a large number of individuals all over the world.
But 5G has a lot of security and privacy issues.
As a result, it's critical to properly identify existing security weaknesses and provide effective solutions to address them.
Some security and privacy issues still exist in the standard 5G AKA protocol, which have been identified and addressed in recent literature.
By taking advantage of those vulnerabilities of the protocol, an adversary can perform some attacks such as SUCI replay attack, parallel session attack, linkability attack, etc.
As a result, this standard protocol cannot ensure the location confidentiality of the subscriber.
In the recent literature, researchers have provided some effective ways to mitigate the vulnerabilities of the protocol.
However, the standard 5G AKA protocol still has a number of security issues that are either partially or entirely unsolved.
In this paper, those issues have been addressed, and a security-enhanced 5G AKA protocol has been proposed which can mitigate the vulnerabilities of the AKA protocol.
The proposed protocol may now be able to prevent such attacks and ensure the location confidentiality of the subscriber.
Related Results
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Abstract
Introduction
The exact manner in which large language models (LLMs) will be integrated into pathology is not yet fully comprehended. This study examines the accuracy, bene...
CELAYIRLI EMİRÜ’L-ÜMERALIĞINDAN EMİR TİMUR’UN TABİİYETİNE: EMİR ADİL AKA’NIN SERENCAMI
CELAYIRLI EMİRÜ’L-ÜMERALIĞINDAN EMİR TİMUR’UN TABİİYETİNE: EMİR ADİL AKA’NIN SERENCAMI
İlhanlı Devleti’nin yıkılışıyla birlikte Bağdat merkezli kurulan Celayırlı Devleti, Sultan Şeyh Üveys (h. 1356-1374) döneminde İlhanlıların varisi olarak onların topraklarının nere...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...

