A Formal Analysis of 5 G Authentication
@inproceedings{Basin2018AFA,
title={A Formal Analysis of 5 G Authentication},
author={David Basin and Jannik Dreier and Lucca Hirschi and S. Radomirovic and R. Sasse and Vincent Stettler},
year={2018}
}Mobile communication networks connect much of the world’s population. The security of users’ calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5GAKA.We also extract precise requirements from the 3GPP standards defining 5G and we identify… CONTINUE READING
One Citation
References
Publications referenced by this paper.
SHOWING 1-10 OF 29 REFERENCES
A Formal Analysis of 5G Authentication
- Computer Science
- ACM Conference on Computer and Communications Security
- 2018
- 92
- PDF
A Comprehensive Symbolic Analysis of TLS 1.3
- Computer Science
- ACM Conference on Computer and Communications Security
- 2017
- 71
- PDF
Achieving Better Privacy for the 3GPP AKA Protocol
- Computer Science
- Proc. Priv. Enhancing Technol.
- 2016
- 26
- PDF
On Post-compromise Security
- Computer Science
- 2016 IEEE 29th Computer Security Foundations Symposium (CSF)
- 2016
- 63
- PDF
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
- Computer Science
- NDSS
- 2016
- 148
- PDF
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
- Computer Science
- 2016 IEEE Symposium on Security and Privacy (SP)
- 2016
- 57
- PDF
On Security Research Towards Future Mobile Network Generations
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2018
- 38
- PDF





