Next Article in Journal
Navigations for Hospitality Human Resource Management Research: Observing the Keywords, Factors, Topics under the COVID-19 Pandemic
Previous Article in Journal
An Attentive Multi-Modal CNN for Brain Tumor Radiogenomic Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks

1
School of Modern Posts, Xi’an University of Post and Telecommunications, Xi’an 710061, China
2
Shaanxi Provincial Information Engineering Research Institute, Xi’an 710075, China
3
School of Computer, Xi’an University of Post and Telecommunications, Xi’an 710061, China
*
Author to whom correspondence should be addressed.
Submission received: 13 February 2022 / Revised: 27 February 2022 / Accepted: 28 February 2022 / Published: 2 March 2022

Abstract

:
The 3rd generation partnership project (3GPP) has been enhancing the security of the 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in the latest version of the 5G AKA protocol. According to the analysis of the latest version of the 5G AKA protocol, this paper points out seven of its shortcomings. To overcome these shortcomings, an improved primary authentication and key agreement protocol for 5G networks is proposed, which is named 5G-IPAKA. Compared with the latest version of the 5G AKA protocol, the main improvements include that the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key as the pre-shared key, the challenge-–response mechanism for the serving network (SN) is added, the mutual authentication and key confirmation occurs between the UE and the SN, and the message authentication code (MAC) failure procedure is replaced with a timeout mechanism on the HN. Then, the 5G-IPAKA protocol is proven secure in the mixed strand space model for mixed protocols. Further discussion and comparative analysis show that the 5G-IPAKA protocol can overcome the above shortcomings of the latest version of the 5G AKA protocol, and is better than the recently improved 5G AKA protocols. Additionally, the 5G-IPAKA protocol is efficient and backward-compatible.

1. Introduction

With the continuous popularization of 5G communication technology, in the near future, the 5G network, as an important communication infrastructure, will penetrate into diverse vertical fields, such as in transportation, medical treatment, and industry, and will also support various information interactions between people, people and things, and things and things [1]. In the 5G network, three different primary authentication and key agreement protocols are defined in the related 3rd generation partnership project (3GPP) specifications [2,3,4], including the 5G AKA (authentication and key agreement) protocol, the EAP-AKA’ protocol, and the 5G EAP-TLS protocol. The first two protocols are based on the shared key cryptography, while the last one is based on the public key cryptography. These protocols all aim to provide mutual authentication of subscribers and networks. Currently, they are in the process of standardization.
The 5G AKA protocol [2,3,4] was developed directly from the evolution packet system (EPS)-AKA protocol of the long-term evolution (LTE)/4G network [3], so it inherited certain security vulnerabilities from the EPS-AKA protocol, such as impersonation attacks, man-in-the-middle attacks (MitM), and denial of service (DoS) attacks [5,6,7,8,9,10,11]. In [12], the authors analyzed the 5G AKA protocol of TS 33.501 v0.7.0. They discovered a protocol vulnerability that would enable an attacker to impersonate another user in a serving network (SN). Based on the Tamarin model checker [13], Basin et al. [14] investigated the security properties of the 5G AKA protocol of TS 33.501 v15.1.0, and several major issues were revealed, which were related to user localization, the leakage of activity, the impact of active attackers, and the presence of malicious SN while roaming. In [15], the authors pointed out that the 5G AKA protocol suffers from link ability attacks, and proposed a new authentication scheme by making use of the Diffie–Hellman key exchange algorithm to generate the session key. This scheme was successful in preventing link ability attacks along with an MitM attack.
For the more recently 5G AKA protocol, the authors in [16] found a new attack type. They claimed that the protection mechanism of the sequence number (SQN) can be defeated under specific replay attacks due to its use of exclusive-OR (XOR) and a lack of randomness. In [17], the authors modeled all key components of the 5G AKA protocol (i.e., the user equipment, the serving network, and the home network) according to the definition in the 3GPP specification document. They discovered an attack that exploits a potential race condition and additionally showed that solving the race condition for the honest case does not necessarily prevent the attack. In [18], the authors investigated the privacy properties of the 5G AKA protocol using the Bana–Comon logic [19,20]. They discovered a novel de-synchronization attack and proved that their proposed protocol guarantees the privacy properties. In [21], the authors proposed a novel version of the 5G AKA protocol to prevent active attacks and gain resistance against malignant serving networks. Unfortunately, there is a possibility of an SN impersonation, so this scheme does not eliminate the vulnerability towards the MitM attack. Further, Gharsallah et al. in [22] also attempted to launch a revised version of the 5G AKA protocol. However, their proposed protocol suffers from privacy preservation, as the device identities are clearly transmitted in the air, which leads to numerous security attacks.
As time goes on, more attacks on the 5G AKA protocol were found due to the insecure channel between different network domains in the legacy mobile network. In [23], the authors discovered an attack exploiting subscription concealed identifier (SUCI) to track a subscriber in the 5G network, which is directly caused by the insecure air channel. To cover this issue, they proposed a secure authentication scheme by utilizing the existing public key infrastructure (PKI) mechanism. Further, they found a location sniffing attack, which can be implemented by an attacker through inexpensive devices [24]. Similarly, they proposed a fix scheme based on the existing PKI mechanism. In [25], the authors modeled the 5G AKA protocol with symbolic modeling using ProVerif based on three and four entities models, and then proposed their security consideration. Further, Mariya et al. [26] proposed an enhanced version of the authentication and key agreement protocol for 5G system that surmounts the limitations existing in the 5G AKA protocol. Parne et al. [27] introduced a protocol that preserves the privacy of the user identity and overcomes the identified problems of the 5G AKA protocol. Similarly, 3GPP has also been used to enhance the security of the 5G AKA protocol [2,3,4].
However, there may still be some shortcomings in the latest version of the 5G AKA protocol. To solve this problem, we first point out these possible shortcomings. Then, we propose an improved primary authentication and key agreement protocol for 5G networks, named 5G-IPAKA. Finally, we prove that the 5G-IPAKA protocol is secure and that it is efficient and backward-compatible.
The main contributions of this paper are as follows:
  • By analyzing the latest version of the 5G AKA protocol, we point out that the protocol still has seven shortcomings;
  • We propose a new 5G-IPAKA protocol by improving the latest version of the 5G AKA protocol from four aspects;
  • We formally analyze the security of the 5G-IPAKA protocol in the mixed strand space model for mixed protocols [28]. As a result, the 5G-IPAKA protocol is secure in the mixed strand space model;
  • Through discussion and analysis, we are able to overcome the above shortcomings of the latest version of the 5G AKA protocol;
  • Through discussion and a comparative analysis, we show that the new 5G-IPAKA protocol is better than the recently improved 5G AKA protocols in overcoming the various shortcomings, and is efficient and backward-compatible.
The rest of this paper is organized as follows. Section 2 provides an overview of the latest version of the 5G AKA protocol. In Section 3, we point out seven shortcomings of the latest version of the 5G AKA protocol. Section 4 describes our proposed 5G-IPAKA protocol. Section 5 provides a formal verification of the 5G-IPAKA protocol in the mixed strand space model. In Section 6, we present the discussion and analysis, and conclude the paper in Section 7.

2. Overview of the 5G AKA Protocol

According to [2,3,4], the steps of the latest version of the 5G AKA protocol in the 3GPP standard version v17.4.0 of TS 33.501 are illustrated in Figure 1.
In Figure 1, the universal subscriber identity module (USIM) and the mobile equipment (ME) are located in the user equipment (UE), and the security anchor function (SEAF) is located in the SN. The authentication server function (AUSF), the unified data management (UDM), the authentication credential repository and processing function (ARPE), and the subscriber identity de-concealing function (SIDF) are located in the home network (HN). The messages between the SN and the HN are usually protected. The detailed steps of the latest version of the 5G AKA protocol are as follows:
  • When the SEAF initiates an authentication with the UE, the UE sends S U C I to the SEAF, where the UE includes the ME and the USIM. S U C I denotes a SUCI of the UE and S U C I = x G | | { S U P I } E K | | M A C U E , where S U P I denotes the subscription permanent identifier (SUPI) of the UE, x G and x are an ephemeral public–private key pair of the UE for Diffie–Hellman exchange, y G and y are the ephemeral public–private key pair of the HN for Diffie–Hellman exchange, E K | | I C B | | M K = K D F ( x y G ) and M A C U E = H M A C ( M K , { S U P I } E K ) , E K is an encryption key, I C B is an initial counter block (ICB), M K is a message authentication code (MAC) key, M A C U E is a MAC of the UE, K D F ( ) is a key derivation function, and H M A C ( ) is a hash function for computing MAC;
  • Upon receiving S U C I , the SEAF sends S U C I and S N N to the AUSF. S N N denotes the serving network name (SNN) of the SN;
  • If the SEAF is entitled to use S N N , then the AUSF stores the receiving S N N and sends S U C I and S N N to the UDM;
  • The UDM invokes the SIDF regardless of whether S U C I is received. Then, the SIDF de-conceals S U C I to gain S U P I before the UDM can process the request. Based on S U P I , the UDM/ARPF chooses the authentication method;
  • When 5G AKA is selected, the UDM/ARPF generates R A N D , calculates A U T N and X R E S * , and derives K A U S F , and then creates a 5G home environment authentication vector (5G HE AV) from R A N D , A U T N , X R E S * , and K A U S F . R A N D is an unpredictable challenge of the HN. A U T N is an authentication token of the HN and A U T N = S Q N A K | | A M F | | M A C , where S Q N is a fresh sequence number generated by the HN, A K is an anonymity key and A K = f 5 ( K , R A N D ) , A M F is the authentication management field (AMF) and the separation bit of the AMF is set 1, M A C is a MAC of the HN and M A C = f 1 ( K , S Q N | | R A N D | | A M F ) , K is a long-term key between the UE and the HN, f 1 ( ) is a message authentication function, and f 5 ( ) is a key-generating function. Here, X R E S * = K D F ( C K | | I K , S N N | | R A N D | | X R E S ) , where C K is a cipher key and C K = f 3 ( K , R A N D ) , I K is an integrity key and I K = f 4 ( K , R A N D ) , X R E S is an expected response and X R E S = f 2 ( K , R A N D ) , f 2 ( ) is a message authentication function, and f 3 ( ) and f 4 ( ) are two key-generating functions. K A U S F is a key derived from C K and I K , and K A U S F = K D F ( C K | | I K , S N N | | S Q N A K ) ;
  • The UDM sends the 5G HE AV to the AUSF together with S U P I . When an authentication and key management for applications (AKMA) subscription is used, the UDM also sends A K M A to the AUSF. A K M A denotes the AKMA indication and routing indicator;
  • The AUSF stores the X R E S * temporarily together with the received S U P I ;
  • The AUSF generates a 5G AV from the 5G HE AV received from the UDM/ARPF by computing H X R E S * from X R E S * , computing K S E A F from K A U S F , replacing X R E S * with H X R E S * , and replacing K A U S F with K S E A F in the 5G HE AV, where H X R E S * = S H A 256 ( R A N D | | X R E S * ) , K S E A F = K D F ( K A U S F , S N N ) , and S H A 256 ( ) is a hash function;
  • The ASUF creates a 5G serving environment authentication vector (5G SE AV) by removing K S E A F from the 5G AV, then sends the 5G SE AV (i.e., R A N D , A U T N , and H X R E S * ) to the SEAF;
  • The SEAF stores H X R E S * , and then sends R A N D , A U T N , n g K S I , and A B B A to the UE. Here, n g K S I is used by the UE and the access and mobility management function (AMF) to identify the K A M F and the partial native security context that is created if the authentication is successful. A B B A denotes the anti-bidding down between architectures (ABBA) parameter;
  • In the UE, the ME forwards R A N D and A U T N to the USIM. Upon receipt of R A N D and A U T N , the USIM first computes the anonymity key A K and retrieves the sequence number S Q N = ( S Q N A K ) A K . Next, the USIM computes X M A C = f 1 ( K , S Q N | | R A N D | | A M F ) and compares this with M A C , which is included in A U T N . Then, the USIM verifies that the received S Q N is in the correct range. If X M A C is the same as M A C and S Q N is in the correct range, then the USIM computes a response R E S = f 2 ( K , R A N D ) , C K , and I K , and then returns R E S , C K , and I K to the ME. The ME then computes R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) , K A U S F , and K S E A F ;
  • The UE sends R E S * to the SEAF;
  • The SEAF computes H R E S * = S H A 256 ( R A N D | | R E S * ) and compares this with H X R E S * . If they coincide, then the SEAF considers the authentication successful from the serving network point of view; if not, then the SEAF considers the authentication unsuccessful;
  • The SEAF sends the received R E S * to the AUSF;
  • The AUSF compares the received R E S * with the stored X R E S * . If R E S * and X R E S * are equal, then the AUSF considers the authentication successful from the home network point of view. Then, the AUSF informs the UDM about the authentication result;
  • The AUSF indicates to the SEAF whether the authentication was successful or not from the home network point of view (i.e., R e s u l t ). If the authentication was successful, then the ASUF also sends K S E A F and S U P I to the SEAF.
In step 11, if X M A C and M A C are different, then the USIM indicates to the ME an MAC failure of A U T N . Then, the UE sends a “MAC failure” indication to the SEAF. Further, the SEAF sends the “MAC failure” indication to the AUSF. Finally, the ASUF sends the “MAC failure” indication to the UDM/ARPF.
In step 11, if S Q N is not in the correct range, then the USIM computes A U T S = S Q N U E A K | | M A C S , and then sends A U T S with a “synchronization failure” indication to the ME, where S Q N U E denotes the highest sequence number the USIM has accepted, A K = f 5 ( K , R A N D ) , M A C S = f 1 ( K , S Q N U E | | R A N D | | A M F 0 ) , A M F 0 is a dummy value of all zeros, f 1 ( ) is a message authentication function, and f 5 ( ) is a key-generating function. Then, the UE sends A U T S with a “synchronization failure” indication to the SEAF. Further, the SEAF sends R A N D and A U T S with a “synchronization failure” indication to the AUSF. Finally, the ASUF sends R A N D and A U T S with a “synchronization failure” indication to the UDM/ARPF.

3. Shortcomings of the 5G AKA Protocol

According to the analysis of the above 5G AKA protocol, there are still some shortcomings in the latest version of the 5G AKA protocol, as follows:
  • S U C I can be replayed without being found. The HN cannot find out whether S U C I is a replayed message because S U C I does not contain the challenge of the HN. Similarly, the UE cannot find out whether S U C I is a replayed message because A U T N does not contain the challenge of the UE (i.e., x ), which is included in S U C I generated by the UE;
  • Mutual authentication between the UE and the SN cannot be established. The UE cannot authenticate the SN because A U T N does not contain S N N . Similarly, the SN cannot authenticate the UE for the following three reasons. Firstly, the SN does not verify S U C I , A U T N , H X R E S * , R E S * , and A U T S . Secondly, the second received message of the SN does not contain S U P I to match with S U C I in the first received message of the SN. Finally, the last received message of the SN does not contain R A N D , meaning that S U P I in the last received message of the SN cannot match with the UE identity in A U T N and H X R E S * , which are included in the second received message of the SN;
  • K S E A F  cannot reach an agreement. The last received message of the SN does not contain R A N D , so this message can be a replayed message, meaning that K S E A F on the SN is not equal to K S E A F on the HN. As a result, K S E A F on the SN is not equal to K S E A F on the UE;
  • The location privacy of the UE can be compromised. Because A U T N does not contain the challenge of the UE (i.e., x ), the first received message of the UE can be a replayed message. If S Q N A U T N is in the correct range, then the location of the UE can be compromised by reidentifying R E S * . If S Q N A U T N is not in the correct range, then the location privacy of the UE can be compromised by identifying the “synchronization failure” indication; that is to say, when the first received message of the UE is replayed, the legitimate UE response is R E S * or a “synchronization failure” indication, but any other UE response is a “MAC failure” indication. As a result, the location privacy of the legitimate UE can be compromised;
  • DoS attacks against the SN can be formed. Because the received messages of the SN does not contain the challenge of the SN, these messages can be replayed messages. As a result, the penetrator can impersonate the UE and the HN to complete the entire 5G AKA protocol with the SN, forming DoS attacks against the SN;
  • Attacks based on MAC failure can be performed. Firstly, the penetrator can forge or tamper with the first received message of the UE to make the UE respond to a “MAC failure” indication, resulting in authentication failure. Secondly, the penetrator can directly send a “MAC failure” indication to the SN to cause authentication failure. Finally, the penetrator can also replay a “MAC failure” indication between the SN and the HN to cause authentication failure;
  • Perfect forward secrecy cannot be provided. In the latest version of the 5G AKA protocol, if K is leaked, then the penetrator can calculate K A U S F and K S E A F based on those messages transmitted in the past run of the protocol. As a result, the penetrator can decrypt those encrypted communication messages transmitted in the past run of the protocol. Therefore, the latest version of the 5G AKA protocol cannot provide perfect forward secrecy.

4. Our Proposed 5G-IPAKA Protocol

In order to overcome the above shortcomings of the latest version of the 5G AKA protocol, we propose the 5G-IPAKA protocol, which is illustrated in Figure 2.
In Figure 2, the detail steps of the 5G-IPAKA protocol are shown, as follows:
  • When the SEAF initiates an authentication with the UE, the UE sends S U C I to the SEAF;
  • Upon receiving S U C I , the SEAF generates R A N D S N and then sends R A N D S N , S U C I , and S N N to the AUSF, where R A N D S N is an unpredictable challenge of the SEAF;
  • If the SEAF is entitled to use S N N , then the AUSF stores the receiving S N N and sends S U C I and S N N to the UDM;
  • The UDM invokes the SIDF whether S U C I is received or not. Then, the SIDF de-conceals S U C I to gain S U P I before the UDM can process the request. Based on S U P I , the UDM/ARPF chooses the authentication method;
  • When 5G-IPAKA is selected, the UDM/ARPF generates R A N D , calculates A U T N and X R E S * , and derives K A U S F , and then creates a 5G HE AV from R A N D , A U T N , X R E S * , and K A U S F , where A U T N = S Q N A K | | A M F | | M A C , A K = f 5 ( B K , R A N D ) , M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) , C K = f 3 ( B K , R A N D ) , I K = f 4 ( B K , R A N D ) , X R E S = f 2 ( B K , R A N D ) , X R E S * = K D F ( C K | | I K , S N N | | R A N D | | X R E S ) , K A U S F = K D F ( C K | | I K , S N N | | S Q N A K ) , and B K = K D F ( K , x y G | | S N N ) ;
  • The UDM sends the 5G HE AV to the AUSF together with S U P I . When an AKMA subscription is used, the UDM also sends A K M A to the AUSF;
  • The AUSF stores the X R E S * temporarily together with the received S U P I ;
  • The AUSF generates a 5G AV from the 5G HE AV received from the UDM/ARPF by computing H X R E S * from X R E S * , computing K S E A F from K A U S F , replacing X R E S * with H X R E S * , and replacing K A U S F with K S E A F in the 5G HE AV;
  • The ASUF creates a 5G SE AV by adding S U P I to the 5G AV, then sends the 5G SE AV (i.e., R A N D , A U T N , H X R E S * , K S E A F , and S U P I ) together with R A N D S N to the SEAF;
  • The SEAF stores H X R E S * , computes M A C S N , and then sends R A N D S N , R A N D , A U T N , n g K S I , A B B A , and M A C S N to the UE, where M A C S N is a MAC of the SEAF and M A C S N = H M A C ( K S E A F , R A N D S N | | R A N D | | A U T N | | n g K S I | | A B B A ) ;
  • In the UE, the ME forwards R A N D and A U T N to the USIM. Upon receipt of R A N D and A U T N , the USIM first computes B K = K D F ( K , x y G | | S N N ) and the anonymity key A K = f 5 ( B K , R A N D ) and retrieves the sequence number S Q N = ( S Q N A K ) A K . Next, the USIM computes X M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) and compares this with M A C which is included in A U T N . Then, the USIM verifies that the received S Q N is in the correct range. If X M A C is the same as M A C and S Q N is in the correct range, then the USIM computes a response R E S = f 2 ( B K , R A N D ) , C K = f 3 ( B K , R A N D ) , and I K = f 4 ( B K , R A N D ) , and then returns R E S , C K , and I K to the ME. The ME then computes R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) , K A U S F , and K S E A F . Finally, the ME verifies M A C S N using K S E A F . If the verification fails, then the ME aborts;
  • The UE computes M A C U E , 2 , and then sends R E S * and M A C U E , 2 to the SEAF, where M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | R E S * ) is another MAC of the UE;
  • The SEAF verifies M A C U E , 2 . If the verification fails, then the SEAF aborts. Otherwise, the SEAF computes H R E S * = S H A 256 ( R A N D | | R E S * ) and compares this with H X R E S * . If they coincide, then the SEAF considers the authentication as successful from the serving network point of view. If not, then the SEAF considers the authentication as unsuccessful;
  • The SEAF sends the received R E S * to the AUSF;
  • The AUSF compares the received R E S * with the stored X R E S * . If R E S * and X R E S * are equal, then the AUSF considers the authentication as successful from the home network point of view. Then, the AUSF informs the UDM about the authentication result;
  • The AUSF indicates to the SEAF whether the authentication was successful or not from the home network point of view (i.e., R e s u l t ).
In step 11, if X M A C and M A C are different, then the UE directly discards the first received message of the UE without responding to a “MAC failure” indication, so the HN will initiate a new authentication procedure towards the UE when the HN does not receive an authentication response message or a synchronization failure message within a certain period of time.
In step 11, if S Q N is not in the correct range, then the USIM computes A U T S = S Q N U E A K | | M A C S , and then sends A U T S with a “synchronization failure” indication to the ME, where A K = f 5 ( B K , R A N D ) and M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 ) . Then, the ME computes M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | S y n c f | | A U T S ) , and then sends A U T S and M A C U E , 2 with a “synchronization failure” indication to the SEAF, where S y n c f = Synchronization   failure . Further, the SEAF verifies M A C U E , 2 ; if the verification fails then the SEAF aborts, otherwise the SEAF sends R A N D and A U T S with a “synchronization failure” indication to the AUSF. Finally, the ASUF sends R A N D and A U T S with a “synchronization failure” indication to the UDM/ARPF;
Note that the fields not specifically explained in the above steps are the same as Figure 1. Compared with the latest version of the 5G AKA protocol, the main improvements of our proposed 5G-IPAKA protocol are as follows:
  • Replace the pre-shared key between the UE and the HN with a derivation key of the pre-shared key. In detail, K is replaced with B K = K D F ( K , x y G | | S N N ) on the UE and the HN;
  • Add the challenge-response mechanism for the SN. Firstly, R A N D S N is added to the first send message of the SEAF as a challenge and is added to the second received message of the SEAF as a response. Then, R A N D S N is added to the second send message of the SEAF as a challenge and is added to the third received message of the SEAF as a response (i.e., R A N D S N in M A C U E , 2 );
  • Add the mutual authentication and key confirmation between the UE and the SN. Firstly, K S E A F and S U P I are moved to the second sent message of the AUSF from the last sent message of the AUSF. Then, the UE and the SN perform a mutual authentication and key confirmation process based on M A C S N and M A C U E , 2 , which are generated by using K S E A F ;
  • Replace the MAC failure procedure with the timeout mechanism on the HN. If X M A C in the received A U T N and M A C calculated locally by the UE are different, then the UE directly discards the first received message of the UE without responding to a “MAC failure” indication, so the HN will initiate a new authentication procedure towards the UE when the HN does not receive an authentication response message or a synchronization failure message within a certain period of time.

5. Formal Verification of the 5G-IPAKA Protocol

To simplify the formal verification of the 5G-IPAKA protocol, we assume the following:
Assumption 1.
The parties of the 5G-IPAKA protocol shown in Figure 2 are simplified as the UE, the SN, and the HN;
Assumption 2.
There is a session key between the SN and the HN, and it is secure;
Assumption 3.
Here, n g K S I and A B B A do not affect the security of the 5G AKA protocol, so they are ignored.
According to these assumptions, the 5G-IPAKA protocol shown in Figure 2 can be summarized into two cases as follows:
Case I: The verification of A U T N succeeds and the authentication is successful. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { R A N D S N | | S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D S N | | R A N D | | A U T N | | M A C S N ;
  • U E S N : R E S * | | M A C U E , 2 ;
  • S N H N : { R E S * } K S N , H N ;
  • H N S N : { R e s u l t } K S N , H N .
Case II: The verification of A U T N fails and it is a synchronization failure. The steps of this case are as follows:
  • U E S N : S U C I ;
  • S N H N : { R A N D S N | | S U C I | | S N N } K S N , H N ;
  • H N S N : { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N ;
  • S N U E : R A N D S N | | R A N D | | A U T N | | M A C S N ;
  • U E S N : S y n c f | | A U T S | | M A C U E , 2 ;
  • S N H N : { S y n c f | | R A N D | | A U T S } K S N , H N .
In the above cases, K on the UE and the HN is replaced with B K , where B K = K D F ( K , x y G | | S N N ) . K S N , H N denotes the session key between the SN and the HN.
The strand space model [28,29,30] is a well-studied formal analysis method for security protocols. In [28], the authors studied the case of mixed protocols, where principals use secret material in more than one protocol. In such cases, the two protocols can potentially interact, forming vulnerabilities that are not present in either protocol alone.
As mentioned above, there are two cases in the 5G-IPAKA protocol, so there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. Therefore, we use the mixed strand space model [28] to analyze the security of our proposed 5G-IPAKA protocol as follows.
Definition 1.
A regular strand space I is a space for case I of the 5G-IPAKA protocol if I is the union of three kinds of strands: (1) Initiator strands s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] with trace: < + S U C I , R A N D S N | | R A N D | | A U T N | | M A C S N , + R E S * | | M A C U E , 2 > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N and S Q N A U T N is in the correct range (i.e., S Q N U E < S Q N ). (2) Responder strands r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] with trace: < S U C I , + { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N , + R A N D S N | | R A N D | | H 1 | | M A C S N , H 3 | | M A C U E , 2 , + { H 3 } K S N , H N , { R e s u l t } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 and H 3 are three messages that are not inspected by S N , where H 2 = S H A 256 ( R A N D | | H 3 ) . (3) Server strands t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] with trace: < { R A N D S N | | S U C I | | S N N } K S N , H N , + { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N , { R E S * } K S N , H N , + { R e s u l t } K S N , H N > . The principal associated with this strand is H N .
Definition 2.
A regular strand space II is a space for case II of the 5G-IPAKA protocol if II is the union of three kinds of strands: (1) Initiator strands s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] with trace: < + S U C I , R A N D S N | | R A N D | | A U T N | | M A C S N , + S y n c f | | A U T S | | M A C U E , 2 > . The principal associated with this strand is U E . X M A C computed locally is equal to M A C A U T N , but S Q N A U T N is not in the correct range (i.e., S Q N U E S Q N ). (2) Responder strands r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , H 1 , H 2 , S y n c f , H 4 ] with trace: < S U C I , + { R A N D S N | | S U C I | | S N N } K S N , H N , { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N , + R A N D S N | | R A N D | | H 1 | | M A C S N , S y n c f | | H 4 | | M A C U E , 2 , + { S y n c f | | R A N D | | H 4 } K S N , H N > . The principal associated with this strand is S N . H 1 , H 2 , and H 4 are three messages that are not inspected by S N . (3) Server strands t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] with trace: < { R A N D S N | | S U C I | | S N N } K S N , H N , + { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H X R E S * } K S N , H N , { S y n c f | | R A N D | | A U T S } K S N , H N > . The principal associated with this strand is H N .
Definition 3.
An infiltrated strand space Σ, P is a space for the 5G-IPAKA protocol if Σ = ΣIΣII P , where penetrator strands p ∈ P [28,29,30].
Theorem 1.
Suppose (1) is a space for the 5G-IPAKA protocol, and  C is a bundle containing an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] and a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] .
Proof of Theorem 1.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2. Because M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) and R A N D uniquely originate in , M A C A U T N t e r m ( < s , 2 > ) must uniquely originate on a server strand t according to Definitions 1 to 3. If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C S N = H M A C ( K S E A F , R A N D S N | | R A N D | | A U T N ) , M A C S N t e r m ( < s , 2 > ) must originate on a responder strand r . According to Assumption 2, { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N . According to Assumption 2, { R E S * } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H X R E S * } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N , K S E A F = K S E A F , H 1 = A U T N , S U P I = S U P I and U E = U E . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r = r , then S U C I = S U C I .
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] , where S Q N U E A U T S . Since B K K P , M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 )   A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] , so x originates on t e r m ( < s , 1 > ) . According to Assumption 1, x originates on t e r m ( < s , 1 > ) . Since x uniquely originates in , s = s . However, s Init II and s Init I , s s . Hence, t is not a server strand of Definition 2. □
Theorem 2.
Suppose (1) is a space for the 5G-IPAKA protocol, and C is a bundle containing an initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] and a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] .
Proof of Theorem 2.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2. Because M A C = f 1 ( B K , S Q N | | R A N D | | A M F ) and R A N D uniquely originate in , M A C A U T N t e r m ( < s , 2 > ) must uniquely originate on a server strand t according to Definitions 1–3.
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] . Since B K K P , C K = f 3 ( B K , R A N D ) K P and I K = f 4 ( B K , R A N D ) K P , so C K | | I K K P . Hence, R E S * t e r m ( < t , 3 > ) must originate on an initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] , so x originates on t e r m ( < s , 1 > ) . According to Assumption 1, x originates on t e r m ( < s , 1 > ) . Since x uniquely originates in , s = s . However, s Init I and s Init II , s s . Hence, t is not a server strand of Definition 1.
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] , where S Q N U E A U T S . Since B K K P , M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 )   A U T S t e r m ( < t , 3 > ) must originate on an initiator strand s . Since x uniquely originates in , s = s , so S Q N U E = S Q N U E and A U T S = A U T S . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C S N = H M A C ( K S E A F , R A N D S N | | R A N D | | A U T N ) , M A C S N t e r m ( < s , 2 > ) must originate on a responder strand r . According to Assumption 2, { R A N D S N | | K S E A F | | S U P I | | R A N D | | A U T N | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N . According to Assumption 2, { S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N , K S E A F = K S E A F , H 1 = A U T N , H 2 = H X R E S * , S U P I = S U P I and U E = U E . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r = r , so S U C I = S U C I . □
According to Theorems 1 and 2, U E successfully authenticates H N and S N , and injection agreement [28,29,30] can be established.
Theorem 3.
Suppose (1) is a space for the 5G-IPAKA protocol, and C is a bundle containing a server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] and a unique responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] .
Proof of Theorem 3.
Since B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2. Because C K = f 3 ( B K , R A N D ) and I K = f 4 ( B K , R A N D ) , C K K P , and I K K P , so C K | | I K K P . Hence, R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on an unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] according to Assumption 3, where S Q N A U T N . Similarly, M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so S Q N = S Q N and A U T N = A U T N . According to Assumption 2, { R E S * } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H X R E S * } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N , K S E A F = K S E A F , H 1 = A U T N , S U P I = S U P I and U E = U E . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r , so S U C I = S U C I . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | R E S * ) , M A C U E , 2 t e r m ( < r , 5 > ) must originate on an initiator strand s . Since x uniquely originates in , s = s , so R A N D S N = R A N D S N . □
Theorem 4.
Suppose (1) is a space for the 5G-IPAKA protocol, and C is a bundle containing a server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] and a unique responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] .
Proof of Theorem 4.
Since  B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2, so M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] according to Assumption 3, where S Q N A U T N . Similarly, M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so S Q N = S Q N and A U T N = A U T N . According to Assumption 2, { S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , H 1 , H 2 , S y n c f , A U T S ] , where S U P I S U C I . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N , K S E A F = K S E A F , S U P I = S U P I , U E = U E , H 1 = A U T N and H 2 = H X R E S * . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r , so S U C I = S U C I . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | S y n c f | | A U T S ) , M A C U E , 2 t e r m ( < r , 5 > ) must originate on an initiator strand s . Since x uniquely originates in , s = s , so R A N D S N = R A N D S N . □
According to Theorems 3 and 4, H N successfully authenticates U E and S N , and the injection agreement [28,29,30] can be established.
Theorem 5.
Suppose (1) is a space for the 5G-IPAKA protocol, and C is a bundle containing a response strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , H 2 , H 3 , R e s u l t , K S E A F , S U P I ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique server strand t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , H X R E S * , R E S * , R e s u l t , K S E A F , S U P I ] , and a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] .
Proof of Theorem 5.
Through Assumptions 2 and 3,  K S N , H N K P and R A N D uniquely originates in , so { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 1 to 3.
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) , x ( R E S * ) and K S E A F is generated for S U P I . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r , so S U C I = S U C I and x = x according to Assumption 1. Hence, A U T N = A U T N , ( H X R E S * ) = H X R E S * and ( R E S * ) = R E S * . Since B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2. Because C K = f 3 ( B K , R A N D ) and I K = f 4 ( B K , R A N D ) , C K K P and I K K P , so C K | | I K K P . Hence, R E S * = K D F ( C K | | I K , S N N | | R A N D | | R E S ) t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init I [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , R E S * ] according to Assumption 3, where S Q N A U T N . Similarly, M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so S Q N = S Q N and A U T N = A U T N . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | R E S * ) , M A C U E , 2 t e r m ( < r , 5 > ) must originate on an initiator strand s . Since x uniquely originates in , s = s , so R A N D S N = R A N D S N .
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) and x A U T S . Similarly, { S y n c f | | R A N D | | A U T S } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , H 1 , H 2 , S y n c f , A U T S ] . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N and R A N D S N originates on t e r m ( < r , 2 > ) . According to Assumptions 1 and 3, R A N D S N originates on t e r m ( < r , 2 > ) . Since R A N D S N uniquely originates in , r = r . However, r Resp II and r Resp I , r r . Hence, t is not a server strand of Definition 2. □
Theorem 6.
Suppose: (1)  is a space for the 5G-IPAKA protocol, and C is a bundle containing a response strand r Resp II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , H 1 , H 2 , S y n c f , H 4 ] ; (2) K K P and K S N , H N K P ; (3) x , R A N D , R A N D S N uniquely originates in . Then, C contains a unique server strand t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , H X R E S * , S y n c f , A U T S ] and a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] .
Proof of Theorem 6.
According to Assumptions 2 and 3, K S N , H N K P and R A N D uniquely originate in , so { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | H 2 } K S N , H N = t e r m ( < r , 3 > ) must uniquely originate on a server strand t according to Definitions 5–7.
If t is a server strand of Definition 1, then t Serv I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , A U T N , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) , x ( R E S * ) , and K S E A F is generated for S U P I . Similarly, { ( R E S * ) } K S N , H N = t e r m ( < t , 3 > ) must originate on a responder strand r Resp I [ U E , S N , H N , S U C I , S N N , R A N D S N , R A N D , H 1 , ( H X R E S * ) , ( R E S * ) , R e s u l t , K S E A F , S U P I ] . Similarly, { R A N D S N | | K S E A F | | S U P I | | R A N D | | H 1 | | ( H X R E S * ) } K S N , H N = t e r m ( < r , 3 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so R A N D S N = R A N D S N and R A N D S N originate on t e r m ( < r , 2 > ) . Through Assumptions 1 and 3, R A N D S N originates on t e r m ( < r , 2 > ) . Since R A N D S N uniquely originates in , r = r . However, r Resp I and r Resp II , r r . Hence, t is not a server strand of Definition 1.
If t is a server strand of Definition 2, then t Serv II [ U E , S N , H N , S U P I , S U C I , S N N , R A N D S N , K S E A F , R A N D , A U T N , ( H X R E S * ) , S y n c f , A U T S ] , where S U P I S U C I , x A U T N , x ( H X R E S * ) and x A U T S . Similarly, { R A N D S N | | S U C I | | S N N } K S N , H N = t e r m ( < t , 1 > ) must originate on a responder strand r . Since R A N D S N uniquely originates in , r = r , so S U C I = S U C I and x = x according to Assumption 1. Hence, A U T N = A U T N , ( H X R E S * ) = H X R E S * and A U T S = A U T S . Since B K = K D F ( K , x y G | | S N N ) , B K K P according to Assumption 2, M A C S = f 1 ( B K , S Q N U E | | R A N D | | A M F 0 ) A U T S t e r m ( < t , 3 > ) must originate on a unique initiator strand s Init II [ U E , S N , H N , S U C I , R A N D S N , R A N D , A U T N , S y n c f , A U T S ] according to Assumption 3, where S Q N A U T N . Similarly, M A C A U T N t e r m ( < s , 2 > ) must originate on a server strand t . Since R A N D uniquely originates in , t = t , so S Q N = S Q N and A U T N = A U T N . According to t , K S E A F is encrypted by K S N , H N . According to Assumption 2, K S E A F K P . Because M A C U E , 2 = H M A C ( K S E A F , R A N D S N | | S y n c f | | A U T S ) , M A C U E , 2 t e r m ( < r , 5 > ) must originate on an initiator strand s . Since x uniquely originates in , s = s , so R A N D S N = R A N D S N . □
According to Theorems 5 and 6, S N successfully authenticates U E and H N , and the injection agreement [28,29,30] can be established.

6. Discussion

6.1. Security of the 5G-IPAKA Protocol

According to the above formal verification of the 5G-IPAKA protocol, mutual authentication between the UE and the SN, mutual authentication between the UE and the SN, and mutual authentication between the SN and the HN are established. Additionally, an injection agreement [28,29,30] among the UE, the SN, and the HN is established. Therefore, the 5G-IPAKA protocol is secure in the mixed strand space model.
Because K is replaced with B K = K D F ( K , x y G | | S N N ) on the UE and the HN, A U T N must contain the challenge of the UE (i.e., x ), which is included in S U C I generated by the UE. Hence, the UE can find out whether S U C I is a replayed message.
According to the above formal verification of the 5G-IPAKA protocol, mutual authentication between the UE and the SN is established. In addition, an injection agreement [28,29,30] among the UE, the SN, and the HN is established, so K S E A F can reach an agreement among the UE, the SN, and the HN.
Because A U T N contains the challenge of the UE (i.e., x ), the first received message of the UE (including A U T N ) cannot be a replayed message, preventing the location privacy of the UE from being compromised.
Since the received messages of the SN contain the challenge of the SN (i.e., R A N D S N ), these messages cannot be some replayed messages, preventing DoS attacks against the SN. In addition, the UE directly discards the first received message without responding to a “MAC failure” indication when X M A C messages in the received A U T N and M A C calculated locally by the UE are different, defending against attacks based on MAC failure.
Because K is replaced with B K = K D F ( K , x y G | | S N N ) , and both K A U S F and K S E A F are generated based on B K , this provides perfect forward secrecy (PFS) based on the Diffie–Hellman exchange.
Hence, our proposed 5G-IPAKA protocol can overcome the above shortcomings in the latest version of the 5G AKA protocol.
A comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the shortcomings of the latest version of the 5G AKA protocol is shown in Table 1.
From Table 1, the recently improved 5G AKA protocols still have some of the shortcomings of the latest version of the 5G AKA protocol, but our proposed 5G-IPAKA overcomes all the shortcomings of the latest version of the 5G AKA protocol.
In [23], the Eph private key and Eph public key of the UE (i.e., x and x G ), the public–private key pair of the SN, and the public–private key pair of the HN are used to ensure the security of the channel between the UE and the SN, the security of channel between the UE and the HN, and the security of the channel between the SN and the HN. Since the first received message of the UE is encrypted by the Eph public key of the UE, this means that the message can only be decrypted by the Eph private key of the UE, so it cannot be a replayed message, preventing the location privacy of the UE being compromised. In addition, the UE can find out whether S U C I is a replayed message. However, the other parts fully inherit the 5G AKA protocol, so the other shortcomings of the 5G AKA protocol still exist in the protocol [23].
In [24], both the synchronization failure and the MAC failure are constructed as the format of R E S * , making it impossible to distinguish them so as to prevent the location privacy of the UE being compromised and prevent attacks based on MAC failure. However, the other parts fully inherit the 5G AKA protocol, so the other shortcomings of the 5G AKA protocol still exist in the protocol of [24].
In [26], S U C I is included in A U T H S E A F in the second received message of the UE, so the UE can find out whether S U C I is a replayed message, where A U T H S E A F is an authentication token of the SEAF. Additionally, the protocol from [26] removes the synchronization failure procedure and the MAC failure procedure, preventing the location privacy of the UE from being compromised and defending against attacks based on MAC failure. Similarly, M A C A R P F is also included in A U T H S E A F from the second received message of the UE, but it does not contain S E A F I D , where M A C A R P F is a MAC of the ARPF and S E A F I D is the identity of the SEAF (i.e., S N N mentioned above). This means that the UE cannot authenticate the SN being authenticated by the HN, meaning that mutual authentication between the UE and the SN cannot be established and K S E A F cannot reach an agreement. In addition, R A N D S E A F is included in the R A N D U E of the second received message of the SEAF, H X R E S * of the third received message of the SEAF, and R E S * of the fourth received message of the SEAF, although the SEAF does not verify these fields, so DoS attacks against the SN can be formed, where R A N D U E is calculated based on R A N D U E and R A N D S E A F (i.e., the challenges of the UE and the SEAF, respectively). Because K A U S F and K S E A F can be calculated when K is leaked, PFS cannot be provided.
In [27], the time synchronization among the UE, the SN, and the HN is maintained. T U E is included in S U C I , so S U C I cannot be a replayed message, where T U E is a timestamp of the UE. Additionally, the protocol of [27] also removes the synchronization failure procedure and the MAC failure procedure, preventing the location privacy of the UE from being compromised and defending against attacks based on MAC failure. M A C S N is included in the first received message of the UE, but it does not contain S N N . This means that the UE cannot authenticate the SN being authenticated by the HN, meaning that mutual authentication between the UE and the SN cannot be established and K S E A F cannot reach an agreement. For the received messages, the SN does not verify T U E and T H N (i.e., a timestamp of the HN), but only verifies whether R E S is equal to X R E S in phase 1 of the protocol from [27], meaning that DoS attacks against the SN can be formed. Similar to [26], PFS cannot be provided.
Therefore, our proposed 5G-IPAKA protocol is better than these recently improved 5G AKA protocols in overcoming the shortcomings of the latest version of the 5G AKA protocol.

6.2. Performance of the 5G-IPAKA Protocol

A comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the number of messages, the amount of calculation, and backward compatibility is shown in Table 2.
In Table 2, the number of messages represents the number of messages among the UE, the SN, and the HN. ECDH denotes the generation and verification of an elliptic curve Diffie–Hellman (ECDH) exchange. PED denotes the generation and verification of a public key encryption and decryption process. ED denotes the generation and verification of a symmetric key encryption and decryption process. F denotes the generation and verification of a key function, key derivation function, MAC function, or a hash function, which are grouped into one category because they require the same amount of calculation [27]. LRCS denotes the left circular shift and the right circular shift. XOR denotes the generation and verification of an XOR value.
From Table 2, the number of messages in the 5G-IPAKA protocol is less than the 5G AKA protocol, although the amount of calculation is slightly higher than the 5G AKA protocol. The number of messages in the 5G-IPAKA protocol is less than the protocols in [23,24], and the amount of calculation is also lower than the protocols in [23,24] because they introduce multiple public key encryption and decryption processes. The number of messages in the 5G-IPAKA protocol is the same as the protocol in [26], although the amount of calculation is slightly higher than the protocol in [26]. The number of messages in the 5G-IPAKA protocol is more than in the protocol in [27], and the amount of calculation is also higher than the protocol in [27]. However, the protocol in [27] introduces a timestamp mechanism and must maintain the time synchronization among the UE, the SN, and the HN, which is difficult. Hence, our proposed 5G-IPAKA protocol is efficient.
Additionally, the protocols in [23,24,26,27] destroy the structure of the messages instead of adding fields to the messages or extending fields in the messages, so they are not backward-compatible. Our proposed 5G-IPAKA protocol only extends K and adds some fields to the messages among the UE, the SN, and the HN, so it is forward compatible.

7. Conclusions

In this paper, according to the analysis of the latest version of the 5G AKA protocol, we point out seven shortcomings of this protocol, including that S U C I can be replayed without being found, mutual authentication between the UE and the SN cannot be established, K S E A F cannot reach an agreement, the location privacy of the UE can be compromised, DoS attacks against the SN can be formed, attacks based on MAC failure can be performed, and PFS cannot be provided.
To overcome these shortcomings, we propose a 5G-IPAKA protocol. Compared with the latest version of the 5G AKA protocol, the main improvements of the 5G-IPAKA protocol include that the pre-shared key between the UE and the HN is replaced with a derivation key of the pre-shared key, the challenge-response mechanism for the SN is added, the mutual authentication and key confirmation between the UE and the SN is added, and the MAC failure procedure is replaced with a timeout mechanism on the HN.
Accordingly, we summarize the 5G-IPAKA protocol into two cases, and then use the mixed strand space model for mixed protocols to formally analyze the security of the 5G-IPAKA protocol. As a result, mutual authentication and injection among the UE, the SN, and the HN are established. Therefore, the 5G-IPAKA protocol is secure in the mixed strand space model.
Based on the further discussion and comparative analysis, the 5G-IPAKA protocol can overcome the above shortcomings of the latest version of the 5G AKA protocol, and is better than the recently improved 5G AKA protocols in overcoming these shortcomings. In addition, the 5G-IPAKA protocol is efficient and backward-compatible.
Recently, some authors also point out that the protection mechanism of SQN can be defeated due to its use of XOR in the 5G AKA protocol. This paper does not consider this security problem, and we will further study this security problem in the future.

Author Contributions

Methodology, Y.X.; formal analysis, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No.61741216, 61402367), Shaanxi Science and Technology Co-ordination and Innovation Project (No.2016KTTSGY01-03), National Key Research and Development Program (No. 2018YFC08242-04), and New Star Team Project of Xi’an University of Posts and Telecommunications.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xu, S.; Gan, Z. Review and trends of 5G security technology. Radio Commun. Technol. 2020, 46, 133–138. [Google Scholar]
  2. 3GPP TS 33.102: 3G Security. Security Architecture. Available online: https://www.3gpp.org/DynaReport/33102.htm (accessed on 26 January 2022).
  3. 3GPP TS 33.401: 3GPP System Architecture Evolution (SAE). Security Architecture. Available online: https://www.3gpp.org/DynaReport/33401.htm (accessed on 26 January 2022).
  4. 3GPP TS 33.501: 3GPP System Architecture Evolution (SAE). Security Architecture. Available online: https://www.3gpp.org/DynaReport/33501.htm (accessed on 26 January 2022).
  5. Ferrag, M.A.; Maglaras, L.; Argyriou, A.; Kosmano, D.; Janicke, H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 2018, 101, 55–82. [Google Scholar] [CrossRef] [Green Version]
  6. Jover, R.P.; Marojevic, V. Security and protocol exploit analysis of the 5G specifications. IEEE Access 2019, 7, 24956–24963. [Google Scholar] [CrossRef]
  7. Ahmad, I.; Shahabuddin, S.; Kumar, T.; Okwuibe, J.; Ylianttila, M. Security for 5G and beyond. IEEE Commun. Surv. Tutor. 2019, 21, 3682–3722. [Google Scholar] [CrossRef]
  8. Khan, R.; Kumar, P.; Jayakody, D.N.K.; Liyanage, M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutor. 2019, 22, 196–248. [Google Scholar] [CrossRef] [Green Version]
  9. Hussain, S.R.; Echeverria, M.; Karim, I.; Chowdhury, O.; Berino, E. 5GReasoner: A property-directed security and privacy analysis framework for 5G cellular network protocol. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 669–684. [Google Scholar]
  10. Hussain, S.R.; Echeverria, M.; Chowdhury, O.; Li, N.; Bertino, E. Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019; pp. 1–15. [Google Scholar]
  11. Khan, H.; Martin, K.M. A survey of subscription privacy on the 5G radio interface-the past, present and future. J. Inf. Secur. Appl. 2020, 53, 102537. [Google Scholar] [CrossRef]
  12. Dehnel-Wild, M.; Cremers, C. Security Vulnerability in 5G-AKA Draft; Department of Computer Science, University of Oxford: Oxford, UK, 2018. [Google Scholar]
  13. Meier, S.; Schmidt, B.; Cremers, C.; Basin, D. The Tamarin prover for the symbolic analysis of security protocols. In Proceedings of the 25th International Conference on Computer Aided Verification, Saint Petersburg, Russia, 13–19 July 2013; pp. 696–701. [Google Scholar]
  14. Basin, D.; Dreier, J.; Hirschi, L.; Radomirovic, S.; Sasse, R.; Stettler, V. A formal analysis of 5G authentication. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1383–1396. [Google Scholar]
  15. Liu, F.; Peng, J.; Zuo, M. Toward a secure access to 5G network. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1121–1128. [Google Scholar]
  16. Borgaonkar, R.; Hirschi, L.; Park, S.; Shaik, A. New privacy threat on 3G, 4G, and upcoming 5G AKA Protocols. Proc. Priv. Enhancing Technol. 2019, 3, 108–127. [Google Scholar] [CrossRef] [Green Version]
  17. Cremers, C.; Dehnel-Wild, M. Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019; pp. 1–15. [Google Scholar]
  18. Koutsos, A. The 5G-AKA authentication protocol privacy. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, 17–19 June 2019; pp. 464–479. [Google Scholar]
  19. Bana, G.; Comon-Lundh, H. Towards unconditional soundness: Computationally complete symbolic attacker. In Proceedings of the First international conference on Principles of Security and Trust (ETAPS), Tallinn, Estonia, 24 March–1 April 2012; pp. 189–208. [Google Scholar]
  20. Bana, G.; Comon-Lundh, H. A computationally complete symbolic attacker for equivalence properties. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 609–620. [Google Scholar]
  21. Braeken, A.; Liyanage, M.; Kumar, P.; Murphy, J. Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 2019, 7, 64040–64052. [Google Scholar] [CrossRef]
  22. Gharsallah, I.; Smaoui, S.; Zarai, F. A secure efficient and lightweight authentication protocol for 5G cellular networks: SEL-AKA. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1311–1316. [Google Scholar]
  23. Hu, X.; Liu, C.; Liu, S.; Cheng, X. A security enhanced 5G authentication scheme for insecure channel. Trans. Inf. Syst. 2020, 103, 711–713. [Google Scholar] [CrossRef] [Green Version]
  24. Hu, X.; Liu, C.; Liu, S.; Li, J.; Cheng, X. A vulnerability in 5G authentication protocols and its Countermeasure. IEICE Trans. Inf. Syst. 2020, 103, 1806–1809. [Google Scholar] [CrossRef]
  25. Edris, E.K.K.; Aiash, M.; Loo, J.K. Formal verification and analysis of primary authentication based on 5G-AKA protocol. In Proceedings of the 2020 7th International Conference on Software Defined Systems (SDS), Paris, France, 20–23 April 2020; pp. 256–261. [Google Scholar]
  26. Ouaissa, M.; Ouaissa, M. An improved privacy authentication protocol for 5G mobile networks. In Proceedings of the 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM), Dehradun, India, 21–22 August 2020; pp. 136–143. [Google Scholar]
  27. Parne, B.L.; Gupta, S.; Gandhi, K.; Meena, S. PPSE: Privacy preservation and security efficient AKA protocol for 5G communication networks. In Proceedings of the 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), New Delhi, India, 14–17 December 2020; pp. 1–6. [Google Scholar]
  28. Fábrega, F.J.T.; Herzog, J.C.; Guttman, J.D. Mixed strand spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, 30 June 1999; pp. 72–82. [Google Scholar]
  29. Fábrega, F.J.T.; Herzog, J.C.; Guttman, J.D. Strand space: Proving security protocols correct. J. Comput. Secur. 1999, 7, 191–230. [Google Scholar] [CrossRef]
  30. Herzog, J.C. The Diffie-Hellman key-agreement scheme in the strand-space model. In Proceedings of the 16th IEEE Computer Security Foundation Workshop, Pacific Grove, CA, USA, 30 June–2 July 2003; pp. 234–247. [Google Scholar]
Figure 1. The steps of the latest version of the 5G AKA protocol.
Figure 1. The steps of the latest version of the 5G AKA protocol.
Information 13 00125 g001
Figure 2. Our proposed 5G-IPAKA protocol.
Figure 2. Our proposed 5G-IPAKA protocol.
Information 13 00125 g002
Table 1. Comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the shortcomings of the latest version of the 5G AKA protocol.
Table 1. Comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the shortcomings of the latest version of the 5G AKA protocol.
Shortcomings5G AKA[23][24][26][27]5G-IPAKA
S U C I can be replayed without being foundYesNoYesNoNoNo
Mutual authentication between the UE and the SN cannot be establishedYesYesYesYesYesNo
K S E A F cannot reach an agreementYesYesYesYesYesNo
The location privacy of the UE can be compromisedYesNoNoNoNoNo
DoS attacks against the SN can be formedYesYesYesYesYesNo
Attacks based on MAC failure can be performedYesYesNoNoNoNo
Perfect forward secrecy cannot be providedYesYesYesYesYesNo
Table 2. A comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the number of messages, the amount of calculation, and backward compatibility.
Table 2. A comparative analysis between the 5G-IPAKA protocol and the recently improved 5G AKA protocols [23,24,26,27] regarding the number of messages, the amount of calculation, and backward compatibility.
ProtocolsThe Number of MessagesThe Amount of CalculationBackward Compatibility
5G AKA111ECDH+1ED+12F+2XOR-
[23]114PED+1ED+10F+2XORNo
[24]112PED+1ECDH+1ED+13F+1XORNo
[26]91ECDH+1ED+12FNo
[27]71ED+15F+1LRCS+6XORNo
5G-IPAKA91ECDH+1ED+16F+2XORYes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xiao, Y.; Wu, Y. 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks. Information 2022, 13, 125. https://0-doi-org.brum.beds.ac.uk/10.3390/info13030125

AMA Style

Xiao Y, Wu Y. 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks. Information. 2022; 13(3):125. https://0-doi-org.brum.beds.ac.uk/10.3390/info13030125

Chicago/Turabian Style

Xiao, Yuelei, and Yang Wu. 2022. "5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks" Information 13, no. 3: 125. https://0-doi-org.brum.beds.ac.uk/10.3390/info13030125

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop