Browse > Article

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement  

Jung, Jin Woo (육군 지상작전사령부 연합사단협조단)
Lee, Soo Jin (국방대학교 국방과학학과)
Publication Information
Abstract
The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.
Keywords
5G; Security; Authentication; Key Agreement; Physical Unclonable Function;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 박성준, "5G 이동통신 기술동향," 주간기술동향, 제 1844호, pp. 2-11, 2018.
2 유우영, "IoT 보안에 대한 국내외 연구 동향 분석," 융합보안논문지, 제 18권, 제 1호, pp. 62-67.
3 3GPP , "TS 33.501, Security architecture and procedures for 5G system," V15.2.0, 2018.
4 3GPP, "TS 33.401, 3GPP System Architecture Evolution Security architecture," V15.5.0, 2018.
5 3GPP "TS 24.501, Non Access Stratum(NAS) protocol for 5G System," V15.1.0, 2018.
6 3GPP, "TS 23.501, System Architecture for the 5G System" V15.3.0, 2018.
7 Martin Dehnel-Wild, "Security vulnerability in 5G-AKA draft," University of Oxford, 2018.
8 David Basin, "A Formal Analysis of 5G Authentication," arXiv:1806.10360, 2018.
9 "Release 15,"http://www.3gpp.org/release-15
10 김득원, "4차 산업혁명시대의 핵심 인프라, 5G", KISDI Premium Report, 17-06, pp. 1-16, 2017.
11 이동건, 이연철, 김경훈, 박종규, 최용제, 김호원, "안전하고 신뢰성 있는 PUF 구현을 위한 가이드라인," 정보보호학회논문지, 제 24권, 제 1호, pp. 241-259, 2014.   DOI
12 변진욱, "PUF 기반 RFID 인증 프로토콜의 효율적 설계에 관한 연구," 정보보호학회논문지, 제 24권, 제 5호, pp. 987-999, 2014.   DOI
13 김승열, 이제훈, "신뢰성 향상을 위한 듀얼안티퓨즈 OTP 메모리 채택 D-PUF 회로," 융합보안논문지, 제 15권, 제 3호, pp. 100-105, 2015.
14 백종학, 신광조, "PUF 기술을 활용한 보안칩 기술 개발과 그 응용 분야," 전자공학회지, 제 43권, 제 7호, pp. 59-67, 2016.
15 Daihyun Lim, "Extracting Secret Keys from Integrated Circuits," IEEE Transactions on VLSI Systems. vol. 13, no. 10, pp. 1200-1205, 2015.   DOI