A survey of subscription privacy on the 5G radio interface-the past, present and future

H Khan, KM Martin - Journal of Information Security and Applications, 2020‏ - Elsevier
End-user privacy in mobile telephony systems is nowadays of great interest because of the
envisaged hyper-connectivity and the potential of the unprecedented services (virtual reality …

The 5G-AKA authentication protocol privacy

A Koutsos - 2019 IEEE European symposium on security and …, 2019‏ - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …

Achieving better privacy for the 3GPP AKA protocol

PA Fouque, C Onete, B Richard - Cryptology ePrint Archive, 2016‏ - eprint.iacr.org
Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G
mobile-network communications, the AKA protocol is meant to provide a mutually …

Performance and security enhanced authentication and key agreement protocol for SAE/LTE network

FB Degefa, D Lee, J Kim, Y Choi, D Won - Computer Networks, 2016‏ - Elsevier
Abstract In recent years, Long Term Evolution has been one of the promising technologies of
current wireless communication systems. Quality of service and data rate contribute for the …

A cryptographic analysis of umts/lte aka

S Alt, PA Fouque, G Macario-Rat, C Onete… - … Conference on Applied …, 2016‏ - Springer
Secure communications between mobile subscribers and their associated operator
networks require mutual authentication and key deri-vation protocols. The 3GPP 3 GPP …

A survey on authentication and access control for mobile networks: from 4G to 5G

S Behrad, E Bertin, N Crespi - Annals of Telecommunications, 2019‏ - Springer
The next generation of mobile networks, 5G, is expected to support a set of multiple
requirements and use cases that will create an improved user experience. 5G will also be …

Securing authentication for mobile networks, a survey on 4G issues and 5G answers

S Behrad, E Bertin, N Crespi - 2018 21st conference on …, 2018‏ - ieeexplore.ieee.org
The upcoming fifth generation of mobile networks is expected to support a set of many
requirements and use cases. However, it should be able to provide a high level of security …

Fvf-aka: A formal verification framework of aka protocols for multi-server iot

Y Fei, H Zhu, J Yin - Formal Aspects of Computing, 2023‏ - dl.acm.org
As IoT in a multi-server environment increases resources' utilization, more and more
problems of IoT authentication and key agreement are being revealed. The Authentication …

Trashing IMSI catchers in mobile networks

MSA Khan, CJ Mitchell - Proceedings of the 10th ACM Conference on …, 2017‏ - dl.acm.org
We address the decades-old privacy problem of disclosure of the permanent subscriber
identity (IMSI) that makes IMSI catchers a real threat to all generations of mobile networks. A …

Privacy-preserving authenticated key exchange and the case of IKEv2

S Schäge, J Schwenk, S Lauer - IACR International Conference on Public …, 2020‏ - Springer
In this paper, we present a strong, formal, and general-purpose cryptographic model for
privacy-preserving authenticated key exchange (PPAKE) protocols. PPAKE protocols are …