A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

A survey of subscription privacy on the 5G radio interface-the past, present and future

H Khan, KM Martin - Journal of Information Security and Applications, 2020 - Elsevier
End-user privacy in mobile telephony systems is nowadays of great interest because of the
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …

The 5G-AKA authentication protocol privacy

A Koutsos - 2019 IEEE European symposium on security and …, 2019 - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …

Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks

A Braeken, M Liyanage, P Kumar, J Murphy - Ieee Access, 2019 - ieeexplore.ieee.org
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …

Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers

C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …

{Privacy-Preserving} and {Standard-Compatible}{AKA} Protocol for 5G

Y Wang, Z Zhang, Y **e - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
The 3GPP consortium has published the Authentication and Key Agreement protocol for the
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …

[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol

J Munilla, M Burmester, R Barco - Computer Networks, 2021 - Elsevier
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …

Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability

A Braeken - Computer Networks, 2020 - Elsevier
The recently standardised 5G AKA protocol, to be used in the next generation of mobile
communications, possesses some severe shortcomings. In particular, different types of …

The privacy of the TLS 1.3 protocol

G Arfaoui, X Bultel, PA Fouque, A Nedelcu… - Cryptology ePrint …, 2019 - eprint.iacr.org
Abstract TLS (Transport Layer Security) is a widely deployed protocol that plays a vital role
in securing Internet trafic. Given the numerous known attacks for TLS 1.2, it was imperative …

A symbolic analysis of privacy for tls 1.3 with encrypted client hello

K Bhargavan, V Cheval, C Wood - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
TLS 1.3, the newest version of the Transport Layer Security (TLS) protocol, provides strong
authentication and confidentiality guarantees that have been comprehensively analyzed in a …