| After the 5G network deployment is completed,improving network testing and security detection capabilities will become the basis for ensuring smooth operation and evolution of communication networks.Therefore,it is particularly important to develop a test instrument that can detect the network in real time and locate network faults.This article relies on the Chongqing Municipal Science and Technology Special Project "Development and Application of New Mobile Communication Network Testing Technology",analyzes the security of the authentication protocol between the terminal and the service network,and proposes an improved "lightweight" access authentication protocol,and It proves that the improved access authentication scheme requires lower terminal computing power than the original protocol,and implements the5 G terminal access authentication process and message integrity protection based on project requirements.The main work content is as follows:1.Briefly introduce the basic knowledge of 5G network.This article first summarizes the access authentication protocol and related research used by 2G ~ 4G,then introduces the 5G security architecture and access mechanism in detail,analyzes the security of the 5G AKA protocol,and points out its existing security problems.2.Improved 5G authentication and key agreement protocol.Adding the name of the home network to the calculation of the authentication vector MAC that the home network sends to the user strengthens the terminal's authentication of the network.The terminal and home network uses the key of elliptic encryption curve to generate random number RAND,which increases the confidentiality in the derivation process of authentication parameters.In addition,the calculation process of the authentication parameter RES *(XRES *)was modified to reduce the calculation redundancy.3.Introduce the theory of string space,based on the string space theory,it is proved that the protocol attribute between the terminal and the service network in the improved 5G AKA protocol satisfies the weak consistency.Then,by comparing the bandwidth consumption and computational overhead of the original protocol and theimproved protocol,it is proved that the improved protocol has lower requirements for terminal computing power than the original protocol.4.On the basis of theoretical research on 5G network architecture and terminal authentication protocol,clarify the functional requirements of the instrument,and put forward the design plan of 5G terminal simulator authentication and secure access system.The message integrity protection mechanism of the 5G system is analyzed,and the NIA1 algorithm in the 5G protocol is mainly introduced and the algorithm implementation function is constructed.5.Combine the relevant protocol standards formulated in 3GPP,verify the correctness of the authentication and security confirmation process through RRC and NAS message data,and verify the correctness of the NIA1 code by comparing the test cases provided by 3GPP. |