Abstract
In this paper, we have proposed a lightweight mutual authentication and key agreement scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed 5GMAKA protocol has been implemented to overcome the problem associated with the 5G authentication and key agreement (5G AKA) protocol suggested by the 3rd generation partnership project (3GPP). 5G AKA is exposed to various sorts of fatal network security attacks and takes excessive time to execute (\(\sim ~685.62\,{\rm milliseconds}\)) compared to other related authentication and key agreement schemes as per the literature survey. The stability and robustness of the proposed 5GMAKA under safety issues are ensured by the results obtained from the security analysis of the scheme using the well-known rubin logic and automatic validation of internet security protocol applications (AVISPA) simulation tool. The performance analysis of the proposed 5GMAKA shows that this scheme is superior compared to 5G AKA of 3GPP and other standard protocols with respect to enhanced security features, five communication rounds, and shorter execution time (\(\sim 0.72\,{\rm milliseconds}\)) which is the lowest among all other related schemes.







Similar content being viewed by others
Data availability
The datasets analysed during the current study are available from the corresponding author on reasonable request.
References
Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151
Forecast number of mobile users worldwide from 2020 to 2025. https://www.statista.com/statistics/218984/number-of-global-mobile-users-since-2010/ Accessed 15 June 2022
Global 5G Adoption to Hit One Billion in 2022. https://www.statista.com/chart/9604/5g-subscription-forecast/ Accessed 15 June 2022
Advantages of 5g and how will benefit IoT. https://www.iotsworldcongress.com/advantatges-of-5g-and-how-will-benefit-iot/ Accessed 30 Sept 2021
3GPP. https://www.3gpp.org/about-3gpp/about-3gpp Accessed 01 June 2021
Ahokangas P, Matinmikko-Blue M, Yrjola S, Seppanen V, Hammainen H, Jurva R, Latva-aho M (2018) Business models for Local 5G micro operators. In: IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), pp 1–8. https://doi.org/10.1109/DySPAN.2018.8610462
Siriwardhana Y, Porambage P, Liyanage M, Walia JS, Matinmikko-Blue M, Ylianttila M (2019) Micro-Operator driven local 5G network architecture for industrial internet. In: IEEE Wireless Communications and Networking Conference (WCNC) 1-8. https://doi.org/10.1109/WCNC.2019.8885900
Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://doi.org/10.1145/2382196.2382221
Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275
Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_56
Liu F, Peng J, Zuo M (2018) Toward a Secure Access to 5G Network. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp 1121–1128. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156
Jover RP, Marojevic M (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access 7:24956–24963. https://doi.org/10.1109/ACCESS.2019.2899254
Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2017) 5G security: analysis of threats and solutions, In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp 193–199. https://doi.org/10.1109/CSCN.2017.8088621
Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2:36–43. https://doi.org/10.1109/MCOMSTD.2018.1700063
Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220
Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296
Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125
Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118
Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465
Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110
Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565
Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126)
Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271
Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441
Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://doi.org/10.1007/978-981-15-0361-0_14
Palit SK, Chakraborty M, Chakraborty S (2022). MASKA: mutual authentication and session key agreement protocol in global mobility networks. In: Applications of machine intelligence in engineering. 309–321. CRC Press. https://doi.org/10.1201/9781003269793
Palit SK, Chakraborty M, Chakraborty S (2022) AUGChain: Blockchain-based mobile user authentication scheme in global mobility network. J Supercomput 78(5):6788–6816. https://doi.org/10.1007/s11227-021-04139-y
5G;Security architecture and procedures for 5G system. (2018) 3GPP TS 33.501 version 15.1.0 Release 15. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf Accessed 1 June 2021
5G;Security architecture and procedures for 5G System(2020) 3GPP TS 33.501 version 15.1.0 Release 16 https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/16.03.00_60/ts_133501v160300p.pdf Accessed 1 June 2021
Dehnel-Wild M, Cremers C (2018) Security vulnerability in 5GAKA Draft. Department of Computer Science, University of Oxford, (technical report). https://www.cs.ox.ac.uk/5G-analysis/5G-AKA-draftvulnerability.pdf
Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127
Koutsos A (2018) The 5G-AKA authentication protocol privacy (technical report). arXiv:1811.06922 v1
Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://doi.org/10.1145/3243734.3243846
Wang Y, Zhang Z, Xie Y (2021) Privacy-preserving and standard-compatible AKA protocol for 5G. 30th USENIX security symposium, pp 3595–3612. https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen
Hu X, Liu C, Liu S, Cheng X (2020) A security enhanced 5g authentication scheme for insecure channel. IEICE Trans Inf Syst, E103.D, 3:711–713. https://doi.org/10.1587/transinf.2019EDL8190
Hu X, Liu C, Liu S, Li J, Cheng X (2020) A vulnerability in 5G authentication protocols and its countermeasure. IEICE Trans Inf Syst, E103.D 8:1806–1809. https://doi.org/10.1587/transinf.2019FOL0001
Braeken A (2020) Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. Comput Netw. https://doi.org/10.1016/j.comnet.2020.107424
Xiao Y, Gao S (2022) Formal verification and analysis of 5G AKA protocol using mixed strand space model. Electronics 11:1333. https://doi.org/10.3390/electronics11091333
Xiao Y, Gao S (2022) 5GAKA-LCCO: a secure 5G authentication and key agreement protocol with less communication and computation overhead. Information 13:257. https://doi.org/10.3390/info13050257
Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052. https://doi.org/10.1109/ACCESS.2019.2914941
NIST Special Publication 800-57 Part 1, Recommendation for key management: part 1—general https://doi.org/10.6028/NIST.SP.800-57pt1r5 Accessed 30 June 2021
Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56
Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031
Barker E, Roginsky A, Davis R NIST Special Publication 800-133 revision 2, recommendation for cryptographic key generation https://doi.org/10.6028/NIST.SP.800-133r2. Accessed 30 Sept, 2021
Munilla J, Burmester M, Barco R (2021) An enhanced symmetric-key based 5G-AKA protocol. Comput Netw. https://doi.org/10.1016/j.comnet.2021.108373
Liu Y, Huo L, Zhou G (2022) TR-AKA: a two-phased, registered authentication and key agreement protocol for 5G mobile networks. IET Inf Secur 16(3):193–207. https://doi.org/10.1049/ise2.12054
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116
AVISPA. Automated validation of internet security protocols and applications. http://www.avispa-project.org/ Accessed 10 Dec 2021
Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17
AVISPA. SPAN, the security protocol animator for AVISPA. http://www.avispa-project.org Accessed 10 December 2021
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: The framework of Rubin logic
Appendix A: The framework of Rubin logic
In Rubin logic, the analysis of protocol is achieved utilizing global set, local set, actions, and inference rules. The details of each component are clarified as follows:
-
1.
Global Set: This set is a composition of four distinct collections: Principal set, rule set, secret set, and observer set. As the protocol starts to run, the content of each set changes. The details of these four sets are given below.
-
Principal set: This set represents the different participants present in the scheme.
-
Rule set: This set contains the rules which can be applied to the existing set to derive some new facts. The different rules used are:
Message meaning rule,
Origin rule,
Sub message origin rule,
Linkage rule.
-
Secret set: This set represents the set of secret parameters stored by the different participants during the run of the protocol.
-
Observer set: This set contains the observer participants of different parameters used in the scheme during the run of the protocol.
-
-
2.
Local Set: A local set is a combination of five different sets and is maintained by each participant in the networks. This set consists of the following set:
-
Possession set (POSS(Pi) = (poss1, poss2, ... , possn)): This set contains all the secret keys, public keys, random numbers, and parameters poss1, poss2, ....possn computed by the participants.
-
Belief set (BEL(Pi) = (bel1, bel2, ..., beln)): This set consists of all the beliefs detained by the participants. This contains beliefs correlated to freshness, possessions of linkage variables, etc.
-
Seen set (SEEN(Pi)): This set contains plaintext message fragments that the participant Pi sees from the messages communicated in the network and that qualify the establishment of the secrets.
-
Behaviour list (BL(Pi) = (al1, al2, .., bhv1, bhv2, ... bhvn)): This set contains a list of activities that appeared in order as per the actual execution of the algorithm denoted here as al1, al2, etc. Apart from this set of actions, send, receive, and update operations of the algorithm are represented here in bhv1, bhv2, etc. Whenever the update operation executes, an update of the local set of a participant concerning POSS (), BEL (), and global set like observer set may be changed. However, an automatic call of receive () operation by a different participant also takes place after the execution of send () operation by any participant.
-
Haskeys set (HK(Pi)): This set consists of the keys that a participant Pi can acquire. Initially, possession set POSS () contains these keys, and this set updates over time whenever the set SEEN ( ) is updated.
-
-
3.
Actions:
-
\(X \leftarrow Y\): The value of Y is assigned to X.
-
Enc({X}Y): Symmetric encryption of information X using key Y.
-
Dec({X}Y): Symmetric decryption of information X using key Y.
-
H(K,X): One-way hash operation of the message X using a secret value K.
-
H(X): One-way hash operation of the message X
-
\(X \bigoplus Y\): Exclusive or operation between the message X and Y.
-
\(X ||Y:\) Concatenation of Y after X.
-
Send (Pi, par1, par2, .. ): send the parameters par1, par2, ... to the participant Pi.
-
Update (par1, par2, ..): Update the parameters par1, par2, ... in possession set POSS(), Believe set BEL(), and observation set.
-
Receive (Pi, par1, par2, .. ): Received the parameters par1, par2, ...from the participant Pi.
-
Check: check whether the condition is true or false.
-
X &&Y: Logical AND of X and Y, i.e. if both X and Y are TRUE then output is TRUE, otherwise, the output is FALSE.
-
-
4.
Inference Rules: We described the set of inference rules as per our requirements, which are directly taken from [39].The notations that are presumed to comprehend the inference rules are given in Table 12.
-
Message meaning rule:\(\dfrac{\{x\}_{k} \text { from } P_{i}\in {\rm POSS}(P_{i}), \{P_{i},P_{j}\}\subseteq {\rm POSS} (P_{i})}{{\rm BEL}(P_{i})={\rm BEL}(P_{i})\bigcup \{x \in {\rm POSS}(P_{i})\}}\)
-
Origin rule:\(\dfrac{x\in {\rm POSS}(P_{i}),\text {x contains x1}, P_{j}\in observers(x1)}{\text {x1 from } P_{j}\in {\rm POSS}(P_{i})}\)
-
Sub message origin rule: \(\dfrac{x \in {\rm POSS}(P_{i}), \text {x contains }\{x1,x2\} from P_{j}}{x2 \text { from } E_{j} \in {\rm POSS}(P_{i})}\)
-
Linkage rule: \(\#(k)\in {\rm BEL}(P),P \in Observers(k),Link(N_{a}) \in {\rm BEL}(P),\)
\(X \text { contains } f(N_{a})\)
\(\dfrac{X \text {contains } x_{1}, \{X\}_{k} \text { from } Q \in {\rm POSS}(P)}{{\rm BEL}(P) :=({\rm BEL}(P)-{\rm LINK}(N_{a}))\bigcup \{\#(x_{1})\}}\)
-
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Palit, S.K., Chakraborty, M. & Chakraborty, S. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network. J Supercomput 79, 3902–3935 (2023). https://doi.org/10.1007/s11227-022-04807-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04807-7