Cargando…
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9229231/ https://www.ncbi.nlm.nih.gov/pubmed/35746307 http://dx.doi.org/10.3390/s22124525 |
_version_ | 1784734690958114816 |
---|---|
author | Chow, Man Chun Ma, Maode |
author_facet | Chow, Man Chun Ma, Maode |
author_sort | Chow, Man Chun |
collection | PubMed |
description | The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol for mutually authenticating user equipment (UE), base stations, and the core network. However, it has been found that 5G-AKA is vulnerable to many attacks, including linkability attacks, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. To address these security issues and improve the robustness of the 5G network, in this paper, we introduce the Secure Blockchain-based Authentication and Key Agreement for 5G Networks (5GSBA). Using blockchain as a distributed database, our 5GSBA decentralizes authentication functions from a centralized server to all base stations. It can prevent single-point-of-failure and increase the difficulty of DDoS attacks. Moreover, to ensure the data in the blockchain cannot be used for device impersonation, our scheme employs the one-time secret hash function as the device secret key. Furthermore, our 5GSBA can protect device anonymity by mandating the encryption of device identities with Subscription Concealed Identifiers (SUCI). Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie–Hellman (ECDH). We use Burrows–Abadi–Needham (BAN) logic and the Scyther tool to formally verify our protocol. The security analysis shows that 5GSBA is superior to 5G-AKA in terms of perfect forward secrecy, device anonymity, and mutual Authentication and Key Agreement (AKA). Additionally, it effectively deters linkability attacks, replay attacks, and most importantly, DoS and DDoS attacks. Finally, the performance evaluation shows that 5GSBA is efficient for both UEs and base stations with reasonably low computational costs and energy consumption. |
format | Online Article Text |
id | pubmed-9229231 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-92292312022-06-25 A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks Chow, Man Chun Ma, Maode Sensors (Basel) Article The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol for mutually authenticating user equipment (UE), base stations, and the core network. However, it has been found that 5G-AKA is vulnerable to many attacks, including linkability attacks, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. To address these security issues and improve the robustness of the 5G network, in this paper, we introduce the Secure Blockchain-based Authentication and Key Agreement for 5G Networks (5GSBA). Using blockchain as a distributed database, our 5GSBA decentralizes authentication functions from a centralized server to all base stations. It can prevent single-point-of-failure and increase the difficulty of DDoS attacks. Moreover, to ensure the data in the blockchain cannot be used for device impersonation, our scheme employs the one-time secret hash function as the device secret key. Furthermore, our 5GSBA can protect device anonymity by mandating the encryption of device identities with Subscription Concealed Identifiers (SUCI). Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie–Hellman (ECDH). We use Burrows–Abadi–Needham (BAN) logic and the Scyther tool to formally verify our protocol. The security analysis shows that 5GSBA is superior to 5G-AKA in terms of perfect forward secrecy, device anonymity, and mutual Authentication and Key Agreement (AKA). Additionally, it effectively deters linkability attacks, replay attacks, and most importantly, DoS and DDoS attacks. Finally, the performance evaluation shows that 5GSBA is efficient for both UEs and base stations with reasonably low computational costs and energy consumption. MDPI 2022-06-15 /pmc/articles/PMC9229231/ /pubmed/35746307 http://dx.doi.org/10.3390/s22124525 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chow, Man Chun Ma, Maode A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title | A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title_full | A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title_fullStr | A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title_full_unstemmed | A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title_short | A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks |
title_sort | secure blockchain-based authentication and key agreement scheme for 3gpp 5g networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9229231/ https://www.ncbi.nlm.nih.gov/pubmed/35746307 http://dx.doi.org/10.3390/s22124525 |
work_keys_str_mv | AT chowmanchun asecureblockchainbasedauthenticationandkeyagreementschemefor3gpp5gnetworks AT mamaode asecureblockchainbasedauthenticationandkeyagreementschemefor3gpp5gnetworks AT chowmanchun secureblockchainbasedauthenticationandkeyagreementschemefor3gpp5gnetworks AT mamaode secureblockchainbasedauthenticationandkeyagreementschemefor3gpp5gnetworks |