S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh
{"title":"5G认证与密钥协商协议在Xbee网络上的实现","authors":"S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh","doi":"10.1109/COMSNETS48256.2020.9027314","DOIUrl":null,"url":null,"abstract":"While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks\",\"authors\":\"S. Sriraam, S. Sajeev, Rohit Joshi, Amogh Vithalkar, M. Bansal, Harshan Jagadeesh\",\"doi\":\"10.1109/COMSNETS48256.2020.9027314\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.\",\"PeriodicalId\":265871,\"journal\":{\"name\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"volume\":\"314 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS48256.2020.9027314\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS48256.2020.9027314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks
While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G - Authentication and Key Agreement (5G-AKA) protocol has been standardised by the 3GPP consortium after multiple iterations and corrective responses. Despite this progress, there is a requirement to collate information from multiple ETSI technical specifications and several research contributions to implement a standardised security architectural model for 5G networks. Identifying the absence of single point repository containing 5G security protocols, this demonstration provides first hand collation and description of state-of-the-art details in simple and unified manner. In this demonstration, we implement the 3GPP compliant 5G-AKA protocol on a network of XBee S2C devices wherein the protocol involves a sequence of modules involving secure authentication, key exchange and payload transmission. To implement the security protocol, we extract the precise recommendations of 3GPP and also use open source algorithms wherever the implementation is left open as proprietary solution. Other than implementing standard modules from 3GPP specifications, we also showcase novel key exchange and provenance-recovery mechanisms that potentially fit the 5G standards in the framework of device-to-device (D2D) communication.