A formal analysis of 5G authentication
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …
users' calls, SMSs, and mobile data depends on the guarantees provided by the …
A survey of subscription privacy on the 5G radio interface-the past, present and future
End-user privacy in mobile telephony systems is nowadays of great interest because of the
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …
The 5G-AKA authentication protocol privacy
A Koutsos - 2019 IEEE European symposium on security and …, 2019 - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …
Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
{Privacy-Preserving} and {Standard-Compatible}{AKA} Protocol for 5G
Y Wang, Z Zhang, Y **e - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
The 3GPP consortium has published the Authentication and Key Agreement protocol for the
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …
[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
A Braeken - Computer Networks, 2020 - Elsevier
The recently standardised 5G AKA protocol, to be used in the next generation of mobile
communications, possesses some severe shortcomings. In particular, different types of …
communications, possesses some severe shortcomings. In particular, different types of …
The privacy of the TLS 1.3 protocol
Abstract TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role
in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative …
in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative …
A symbolic analysis of privacy for tls 1.3 with encrypted client hello
TLS 1.3, the newest version of the Transport Layer Security (TLS) protocol, provides strong
authentication and confidentiality guarantees that have been comprehensively analyzed in a …
authentication and confidentiality guarantees that have been comprehensively analyzed in a …