5G认证与密钥协商协议在Xbee网络上的实现

S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh
{"title":"5G认证与密钥协商协议在Xbee网络上的实现","authors":"S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh","doi":"10.1109/COMSNETS48256.2020.9027314","DOIUrl":null,"url":null,"abstract":"While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks\",\"authors\":\"S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh\",\"doi\":\"10.1109/COMSNETS48256.2020.9027314\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.\",\"PeriodicalId\":265871,\"journal\":{\"name\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"volume\":\"314 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS48256.2020.9027314\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS48256.2020.9027314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着5G系统在全球范围内分阶段部署,用户设备(UE)和核心网络之间通信的信任模型在实现5G承诺的网络目标方面发挥着至关重要的作用。为此,经过多次迭代和纠正响应,3GPP联盟已将5G-身份验证和密钥协议(5G- aka)标准化。尽管取得了这一进展,但仍需要整理来自多个ETSI技术规范和几项研究成果的信息,以实现5G网络的标准化安全架构模型。该演示确定了缺乏包含5G安全协议的单点存储库,以简单统一的方式提供了第一手的最新技术细节整理和描述。在本演示中,我们在XBee S2C设备网络上实现了符合3GPP的5G-AKA协议,其中该协议涉及一系列涉及安全认证,密钥交换和有效载荷传输的模块。为了实现安全协议,我们提取了3GPP的精确建议,并在实现作为专有解决方案保持开放的地方使用开源算法。除了实现3GPP规范中的标准模块外,我们还展示了可能适合设备到设备(D2D)通信框架中的5G标准的新颖密钥交换和溯源恢复机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks
While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信