XinJian Li, ChengTao Wang, Xinhao Zou, Shijun Wang
{"title":"一种安全有效的5G认证方法","authors":"XinJian Li, ChengTao Wang, Xinhao Zou, Shijun Wang","doi":"10.1109/AINIT59027.2023.10212595","DOIUrl":null,"url":null,"abstract":"The 5th generation mobile networks (5G), as a key infrastructure in the digital society, are accelerating their standardization and commercialization processes globally. At the same time, 5G network security issues have also attracted unprecedented attention. The 5G network adopts a more open network architecture and a more flexible protocol system, and the openness and flexibility make the 5G network face new security challenges. Throughout the various security issues in mobile communication systems over time, protocol flaws have always been one of the most easily exploited vulnerabilities by attackers. Therefore, this article proposes a secure and effective protocol in 5G. The proposed scheme can resist multiple common attacks and provide perfect forward confidentiality. The security and performance analysis of the scheme shows that the protocol has good execution efficiency while ensuring the authentication process and subsequent communication security, which can balance efficiency and security.","PeriodicalId":276778,"journal":{"name":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure and Effective Authentication Method in 5G\",\"authors\":\"XinJian Li, ChengTao Wang, Xinhao Zou, Shijun Wang\",\"doi\":\"10.1109/AINIT59027.2023.10212595\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The 5th generation mobile networks (5G), as a key infrastructure in the digital society, are accelerating their standardization and commercialization processes globally. At the same time, 5G network security issues have also attracted unprecedented attention. The 5G network adopts a more open network architecture and a more flexible protocol system, and the openness and flexibility make the 5G network face new security challenges. Throughout the various security issues in mobile communication systems over time, protocol flaws have always been one of the most easily exploited vulnerabilities by attackers. Therefore, this article proposes a secure and effective protocol in 5G. The proposed scheme can resist multiple common attacks and provide perfect forward confidentiality. The security and performance analysis of the scheme shows that the protocol has good execution efficiency while ensuring the authentication process and subsequent communication security, which can balance efficiency and security.\",\"PeriodicalId\":276778,\"journal\":{\"name\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"volume\":\"177 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINIT59027.2023.10212595\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT59027.2023.10212595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure and Effective Authentication Method in 5G
The 5th generation mobile networks (5G), as a key infrastructure in the digital society, are accelerating their standardization and commercialization processes globally. At the same time, 5G network security issues have also attracted unprecedented attention. The 5G network adopts a more open network architecture and a more flexible protocol system, and the openness and flexibility make the 5G network face new security challenges. Throughout the various security issues in mobile communication systems over time, protocol flaws have always been one of the most easily exploited vulnerabilities by attackers. Therefore, this article proposes a secure and effective protocol in 5G. The proposed scheme can resist multiple common attacks and provide perfect forward confidentiality. The security and performance analysis of the scheme shows that the protocol has good execution efficiency while ensuring the authentication process and subsequent communication security, which can balance efficiency and security.