Font Size: a A A

Security Analysis Of The PKI-based 5G-DHAKA Protocol

Posted on:2020-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:X X YangFull Text:PDF
GTID:2518306131961979Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile communication networks,the security access of the fifth generation mobile communication system has gradually become a hot research direction.At present,the Evolved Packet System(EPS)uses the Authentication and Key Agreement(AKA)protocol to authenticate the incoming users to enhance network access security.However,existing protocols still have some drawbacks,such as imperfect identity management mechanisms.As a result of user identity leakage and long-term key leakage,insecure links between mobile network operators may lead to man-in-the-middle attacks.In addition,denial of service(Do S)attacks may occur during user attachment.Therefore,improving the EPS-AKA protocol and analyzing the security of the network access authentication protocol is of great significance for 5G users to securely access the mobile communication network.In this thesis,the public key infrastructure(PKI),Diffie-Hellman integrated encryption scheme(DHIES)and hash challengeesponse mechanism are embedded in the EPS-AKA protocol framework.The PKI-based 5G-DHAKA protocol is formalized and verified.The simulation experiment conducted a security analysis on the protocol.Firstly,the EPS-AKA protocol is analyzed in detail,and potential security vulnerabilities are discovered.Secondly,based on the security vulnerabilities of EPS-AKA protocol,we propose the PKI-based 5G-DHAKA protocol,which includes key management and distribution mechanism of trusted third party,two-way authentication mechanism of users and servers,and hash challenge/response mechanism.The PKI-based 5G-DHAKA protocol guarantees the confidentiality and authentication of user nodes and network-side entities,and effectively mitigates Do S attacks.Finally,the security of the protocol is analyzed through formal modeling and verification experiments and simulation experiments.The results of formal verification experiments show that the user entity and the network side entity participating in the protocol interaction process satisfy the confidentiality and authentication of the security protocol.The simulation experiment proves that the hash challengeesponse mechanism can effectively alleviate Do S attacks.In this thesis,the security analysis of PKI-based 5G-DHAKA protocol is carried out through formal verification and simulation experiments,which improves the security of 5G users accessing mobile communication networks from multiple perspectives.The PKI-based 5G-DHAKA protocol can effectively improve the confidentiality and authentication of protocol entities,improve the computing resources of malicious nodes and mitigate Do S attacks.It provides a new scheme for enhancing the security of mobile communication networks.
Keywords/Search Tags:LTE, EPS-AKA, Access Authentication, Denial of Service Attack, Scyther
PDF Full Text Request
Related items