Skip to main content
Log in

Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In this paper, we have proposed a lightweight mutual authentication and key agreement scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed 5GMAKA protocol has been implemented to overcome the problem associated with the 5G authentication and key agreement (5G AKA) protocol suggested by the 3rd generation partnership project (3GPP). 5G AKA is exposed to various sorts of fatal network security attacks and takes excessive time to execute (\(\sim ~685.62\,{\rm milliseconds}\)) compared to other related authentication and key agreement schemes as per the literature survey. The stability and robustness of the proposed 5GMAKA under safety issues are ensured by the results obtained from the security analysis of the scheme using the well-known rubin logic and automatic validation of internet security protocol applications (AVISPA) simulation tool. The performance analysis of the proposed 5GMAKA shows that this scheme is superior compared to 5G AKA of 3GPP and other standard protocols with respect to enhanced security features, five communication rounds, and shorter execution time (\(\sim 0.72\,{\rm milliseconds}\)) which is the lowest among all other related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

The datasets analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Salih AA, Zeebaree SR, Abdulraheem AS, Zebari RR, Sadeeq MA, Ahmed OM (2020) Evolution of mobile wireless communication to 5G revolution. Tech Rep Kansai Univ 62(5):2139–2151

    Google Scholar 

  2. Forecast number of mobile users worldwide from 2020 to 2025. https://www.statista.com/statistics/218984/number-of-global-mobile-users-since-2010/ Accessed 15 June 2022

  3. Global 5G Adoption to Hit One Billion in 2022. https://www.statista.com/chart/9604/5g-subscription-forecast/ Accessed 15 June 2022

  4. Advantages of 5g and how will benefit IoT. https://www.iotsworldcongress.com/advantatges-of-5g-and-how-will-benefit-iot/ Accessed 30 Sept 2021

  5. 3GPP. https://www.3gpp.org/about-3gpp/about-3gpp Accessed 01 June 2021

  6. Ahokangas P, Matinmikko-Blue M, Yrjola S, Seppanen V, Hammainen H, Jurva R, Latva-aho M (2018) Business models for Local 5G micro operators. In: IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), pp 1–8. https://doi.org/10.1109/DySPAN.2018.8610462

  7. Siriwardhana Y, Porambage P, Liyanage M, Walia JS, Matinmikko-Blue M, Ylianttila M (2019) Micro-Operator driven local 5G network architecture for industrial internet. In: IEEE Wireless Communications and Networking Conference (WCNC) 1-8. https://doi.org/10.1109/WCNC.2019.8885900

  8. Arapinis M, Mancini L, Ritter E, Ryan M, Golde N, Redon K, Borgaonkar R (2012) New privacy issues in mobile telephony: fix and verification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS ’12). Association for Computing Machinery, New York, NY, USA, pp 205–216. https://doi.org/10.1145/2382196.2382221

  9. Fouque PA, Onete C, Richard B (2016) Achieving better privacy for the 3GPP AKA protocol. Proc Priv Enhanc Technol 4:255–275

    Google Scholar 

  10. Hahn C, Kwon H, Kim D, Kang K, Hur J (2014) A privacy threat in 4th generation mobile telephony and its countermeasure. In: Cai Z, Wang C, Cheng S, Wang H, Gao H (eds) Wireless algorithms, systems, and applications. WASA. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_56

  11. Liu F, Peng J, Zuo M (2018) Toward a Secure Access to 5G Network. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp 1121–1128. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00156

  12. Jover RP, Marojevic M (2019) Security and protocol exploit analysis of the 5G specifications. IEEE Access 7:24956–24963. https://doi.org/10.1109/ACCESS.2019.2899254

    Article  Google Scholar 

  13. Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2017) 5G security: analysis of threats and solutions, In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp 193–199. https://doi.org/10.1109/CSCN.2017.8088621

  14. Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2:36–43. https://doi.org/10.1109/MCOMSTD.2018.1700063

    Article  Google Scholar 

  15. Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, Hoboken, pp 207–220

    Chapter  Google Scholar 

  16. Lee C, Lai Y, Chen C, Chen S (2017) Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers Commun 94:1281–1296

    Article  Google Scholar 

  17. Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110–25125

    Article  Google Scholar 

  18. Wu F, Li X, Xu L, Kumari S, Sangaiah A (2018) A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput Electr Eng 68:107–118

    Article  Google Scholar 

  19. Lu Y, Xu G, Li L, Yang Y (2019) Robust privacy-preserving mutual authenticated key agreement scheme in roaming service for global mobility networks. IEEE Syst J 13(2):1454–1465

    Article  Google Scholar 

  20. Madhusudhan R, Shashidhara, (2018) A secure and lightweight authentication scheme for roaming service in global mobile networks. J Inf Secur Appl 38:96–110

    Google Scholar 

  21. Yu S, Lee J, Park Y, Park Y, Lee S, Chung B (2020) A secure and efficient three-factor authentication protocol in global mobility networks. Appl Sci 10(10):3565

    Article  Google Scholar 

  22. Nikooghadam M, Amintoosi H, Kumari S (2020) A provably secure ECC-based roaming authentication scheme for global mobility networks. J Inf Secur Appl 54:102588 (ISSN 2214-2126)

    Google Scholar 

  23. Rahmani AM, Mohammadi M, Lansky J, Mildeova S, Safkhani M, Kumari S, Karim SHT, Hosseinzadeh M. (2021) AMAPG: Advanced mobile authentication protocol for GLOMONET. IEEE Access 9:88256–88271

    Article  Google Scholar 

  24. Kang D, Lee H, Lee Y, Won D (2021) Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. PLoS ONE 16(2):e0247441

    Article  Google Scholar 

  25. Palit SK, Chakraborty M (2020) A mobile user authentication technique in global mobility network. In: Chakraborty M., Chakrabarti S , Balas V (eds.), Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, 1065. https://doi.org/10.1007/978-981-15-0361-0_14

  26. Palit SK, Chakraborty M, Chakraborty S (2022). MASKA: mutual authentication and session key agreement protocol in global mobility networks. In: Applications of machine intelligence in engineering. 309–321. CRC Press. https://doi.org/10.1201/9781003269793

  27. Palit SK, Chakraborty M, Chakraborty S (2022) AUGChain: Blockchain-based mobile user authentication scheme in global mobility network. J Supercomput 78(5):6788–6816. https://doi.org/10.1007/s11227-021-04139-y

    Article  Google Scholar 

  28. 5G;Security architecture and procedures for 5G system. (2018) 3GPP TS 33.501 version 15.1.0 Release 15. https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.01.00_60/ts_133501v150100p.pdf Accessed 1 June 2021

  29. 5G;Security architecture and procedures for 5G System(2020) 3GPP TS 33.501 version 15.1.0 Release 16 https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/16.03.00_60/ts_133501v160300p.pdf Accessed 1 June 2021

  30. Dehnel-Wild M, Cremers C (2018) Security vulnerability in 5GAKA Draft. Department of Computer Science, University of Oxford, (technical report). https://www.cs.ox.ac.uk/5G-analysis/5G-AKA-draftvulnerability.pdf

  31. Borgaonkar R, Hirschi L, Park S, Shaik A (2019) New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Proc Privacy Enhancing Technols, DeGruyter Open 3:108–127

    Article  Google Scholar 

  32. Koutsos A (2018) The 5G-AKA authentication protocol privacy (technical report). arXiv:1811.06922 v1

  33. Basin D, Dreier J, Hirschi L, Radomirovic S, Sasse R, Stettler V (2018) A formal analysis of 5G authentication. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18). Association for Computing Machinery, New York, NY, USA, pp 1383–1396. https://doi.org/10.1145/3243734.3243846

  34. Wang Y, Zhang Z, Xie Y (2021) Privacy-preserving and standard-compatible AKA protocol for 5G. 30th USENIX security symposium, pp 3595–3612. https://www.usenix.org/conference/usenixsecurity21/presentation/wang-yuchen

  35. Hu X, Liu C, Liu S, Cheng X (2020) A security enhanced 5g authentication scheme for insecure channel. IEICE Trans Inf Syst, E103.D, 3:711–713. https://doi.org/10.1587/transinf.2019EDL8190

    Article  Google Scholar 

  36. Hu X, Liu C, Liu S, Li J, Cheng X (2020) A vulnerability in 5G authentication protocols and its countermeasure. IEICE Trans Inf Syst, E103.D 8:1806–1809. https://doi.org/10.1587/transinf.2019FOL0001

    Article  Google Scholar 

  37. Braeken A (2020) Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. Comput Netw. https://doi.org/10.1016/j.comnet.2020.107424

    Article  Google Scholar 

  38. Xiao Y, Gao S (2022) Formal verification and analysis of 5G AKA protocol using mixed strand space model. Electronics 11:1333. https://doi.org/10.3390/electronics11091333

    Article  Google Scholar 

  39. Xiao Y, Gao S (2022) 5GAKA-LCCO: a secure 5G authentication and key agreement protocol with less communication and computation overhead. Information 13:257. https://doi.org/10.3390/info13050257

    Article  Google Scholar 

  40. Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052. https://doi.org/10.1109/ACCESS.2019.2914941

    Article  Google Scholar 

  41. NIST Special Publication 800-57 Part 1, Recommendation for key management: part 1—general https://doi.org/10.6028/NIST.SP.800-57pt1r5 Accessed 30 June 2021

  42. Joseph DP, Krishna M, Arun K (2015) Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms. Int J Adv Res Comput Sci 6:51–56

    Google Scholar 

  43. Bisht N, Singh S (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):1028–1031

    Article  Google Scholar 

  44. Barker E, Roginsky A, Davis R NIST Special Publication 800-133 revision 2, recommendation for cryptographic key generation https://doi.org/10.6028/NIST.SP.800-133r2. Accessed 30 Sept, 2021

  45. Munilla J, Burmester M, Barco R (2021) An enhanced symmetric-key based 5G-AKA protocol. Comput Netw. https://doi.org/10.1016/j.comnet.2021.108373

    Article  Google Scholar 

  46. Liu Y, Huo L, Zhou G (2022) TR-AKA: a two-phased, registered authentication and key agreement protocol for 5G mobile networks. IET Inf Secur 16(3):193–207. https://doi.org/10.1049/ise2.12054

    Article  Google Scholar 

  47. Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MATH  Google Scholar 

  48. Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. Proc Comput Secur Found Workshop VII 1994:100–116

    Article  Google Scholar 

  49. AVISPA. Automated validation of internet security protocols and applications. http://www.avispa-project.org/ Accessed 10 Dec 2021

  50. Oheimb DV (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proc. 3rd APPSEM, Frauenchiemsee, Germany, pp 1–17

  51. AVISPA. SPAN, the security protocol animator for AVISPA. http://www.avispa-project.org Accessed 10 December 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudip Kumar Palit.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: The framework of Rubin logic

Appendix A: The framework of Rubin logic

In Rubin logic, the analysis of protocol is achieved utilizing global set, local set, actions, and inference rules. The details of each component are clarified as follows:

  1. 1.

    Global Set: This set is a composition of four distinct collections: Principal set, rule set, secret set, and observer set. As the protocol starts to run, the content of each set changes. The details of these four sets are given below.

    • Principal set: This set represents the different participants present in the scheme.

    • Rule set: This set contains the rules which can be applied to the existing set to derive some new facts. The different rules used are:

      Message meaning rule,

      Origin rule,

      Sub message origin rule,

      Linkage rule.

    • Secret set: This set represents the set of secret parameters stored by the different participants during the run of the protocol.

    • Observer set: This set contains the observer participants of different parameters used in the scheme during the run of the protocol.

  2. 2.

    Local Set: A local set is a combination of five different sets and is maintained by each participant in the networks. This set consists of the following set:

    • Possession set (POSS(Pi) = (poss1, poss2, ... , possn)): This set contains all the secret keys, public keys, random numbers, and parameters poss1, poss2, ....possn computed by the participants.

    • Belief set (BEL(Pi) = (bel1, bel2, ..., beln)): This set consists of all the beliefs detained by the participants. This contains beliefs correlated to freshness, possessions of linkage variables, etc.

    • Seen set (SEEN(Pi)): This set contains plaintext message fragments that the participant Pi sees from the messages communicated in the network and that qualify the establishment of the secrets.

    • Behaviour list (BL(Pi) = (al1, al2, .., bhv1, bhv2, ... bhvn)): This set contains a list of activities that appeared in order as per the actual execution of the algorithm denoted here as al1, al2, etc. Apart from this set of actions, send, receive, and update operations of the algorithm are represented here in bhv1, bhv2, etc. Whenever the update operation executes, an update of the local set of a participant concerning POSS (), BEL (), and global set like observer set may be changed. However, an automatic call of receive () operation by a different participant also takes place after the execution of send () operation by any participant.

    • Haskeys set (HK(Pi)): This set consists of the keys that a participant Pi can acquire. Initially, possession set POSS () contains these keys, and this set updates over time whenever the set SEEN ( ) is updated.

  3. 3.

    Actions:

    • \(X \leftarrow Y\): The value of Y is assigned to X.

    • Enc({X}Y): Symmetric encryption of information X using key Y.

    • Dec({X}Y): Symmetric decryption of information X using key Y.

    • H(K,X): One-way hash operation of the message X using a secret value K.

    • H(X): One-way hash operation of the message X

    • \(X \bigoplus Y\): Exclusive or operation between the message X and Y.

    • \(X ||Y:\) Concatenation of Y after X.

    • Send (Pi, par1, par2, .. ): send the parameters par1, par2, ... to the participant Pi.

    • Update (par1, par2, ..): Update the parameters par1, par2, ... in possession set POSS(), Believe set BEL(), and observation set.

    • Receive (Pi, par1, par2, .. ): Received the parameters par1, par2, ...from the participant Pi.

    • Check: check whether the condition is true or false.

    • X &&Y: Logical AND of X and Y, i.e. if both X and Y are TRUE then output is TRUE, otherwise, the output is FALSE.

  4. 4.

    Inference Rules: We described the set of inference rules as per our requirements, which are directly taken from [39].The notations that are presumed to comprehend the inference rules are given in Table 12.

    • Message meaning rule:\(\dfrac{\{x\}_{k} \text { from } P_{i}\in {\rm POSS}(P_{i}), \{P_{i},P_{j}\}\subseteq {\rm POSS} (P_{i})}{{\rm BEL}(P_{i})={\rm BEL}(P_{i})\bigcup \{x \in {\rm POSS}(P_{i})\}}\)

    • Origin rule:\(\dfrac{x\in {\rm POSS}(P_{i}),\text {x contains x1}, P_{j}\in observers(x1)}{\text {x1 from } P_{j}\in {\rm POSS}(P_{i})}\)

    • Sub message origin rule: \(\dfrac{x \in {\rm POSS}(P_{i}), \text {x contains }\{x1,x2\} from P_{j}}{x2 \text { from } E_{j} \in {\rm POSS}(P_{i})}\)

    • Linkage rule: \(\#(k)\in {\rm BEL}(P),P \in Observers(k),Link(N_{a}) \in {\rm BEL}(P),\)

      \(X \text { contains } f(N_{a})\)

      \(\dfrac{X \text {contains } x_{1}, \{X\}_{k} \text { from } Q \in {\rm POSS}(P)}{{\rm BEL}(P) :=({\rm BEL}(P)-{\rm LINK}(N_{a}))\bigcup \{\#(x_{1})\}}\)

Table 12 Notations used in the inference rules

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Palit, S.K., Chakraborty, M. & Chakraborty, S. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network. J Supercomput 79, 3902–3935 (2023). https://doi.org/10.1007/s11227-022-04807-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04807-7

Keywords