With the development of mobile communications, the authors step into the 5G era. 5G-AKA is intended to serve as a certification standard for users to safely and stably enjoy 5G mobile services. However, recent research proves that some attacks may happened based on information deciphering and message replay. In addition, the authors found that some variants of 5G-AKA are also at risk of linkability attacks. Therefore, in order to solve the above-mentioned risks, the authors propose a two-phased, registered protocol TR-AKA. This protocol finishes two-way authentication between the user and the home network through only two message-sending rounds, and a temporary identity variable group is applied to replace the real information for transmission. A newly designed variable is also used to strictly control the increase of the sequence number to promote the sensitivity of freshness. Finally, the authors choose the Tamarin tool to prove that TR-AKA has achieved authentication and privacy-protection objectives, and further discussions have also verified the rationality of the protocol design.
Read full abstract