Threats to 5G Group-based Authentication
Rosario Giustolisi, Christian Gehrmann
2016
Abstract
The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.
DownloadPaper Citation
in Harvard Style
Giustolisi R. and Gehrmann C. (2016). Threats to 5G Group-based Authentication . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 360-367. DOI: 10.5220/0005996203600367
in Bibtex Style
@conference{secrypt16,
author={Rosario Giustolisi and Christian Gehrmann},
title={Threats to 5G Group-based Authentication},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={360-367},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005996203600367},
isbn={978-989-758-196-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Threats to 5G Group-based Authentication
SN - 978-989-758-196-0
AU - Giustolisi R.
AU - Gehrmann C.
PY - 2016
SP - 360
EP - 367
DO - 10.5220/0005996203600367