• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于区块链的安全认证和密钥协商方案用于 3GPP5G 网络。

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.

机构信息

School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore.

College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar.

出版信息

Sensors (Basel). 2022 Jun 15;22(12):4525. doi: 10.3390/s22124525.

DOI:10.3390/s22124525
PMID:35746307
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9229231/
Abstract

The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol for mutually authenticating user equipment (UE), base stations, and the core network. However, it has been found that 5G-AKA is vulnerable to many attacks, including linkability attacks, denial-of-service (DoS) attacks, and distributed denial-of-service (DDoS) attacks. To address these security issues and improve the robustness of the 5G network, in this paper, we introduce the Secure Blockchain-based Authentication and Key Agreement for 5G Networks (5GSBA). Using blockchain as a distributed database, our 5GSBA decentralizes authentication functions from a centralized server to all base stations. It can prevent single-point-of-failure and increase the difficulty of DDoS attacks. Moreover, to ensure the data in the blockchain cannot be used for device impersonation, our scheme employs the one-time secret hash function as the device secret key. Furthermore, our 5GSBA can protect device anonymity by mandating the encryption of device identities with Subscription Concealed Identifiers (SUCI). Linkability attacks are also prevented by deprecating the sequence number with Elliptic Curve Diffie-Hellman (ECDH). We use Burrows-Abadi-Needham (BAN) logic and the Scyther tool to formally verify our protocol. The security analysis shows that 5GSBA is superior to 5G-AKA in terms of perfect forward secrecy, device anonymity, and mutual Authentication and Key Agreement (AKA). Additionally, it effectively deters linkability attacks, replay attacks, and most importantly, DoS and DDoS attacks. Finally, the performance evaluation shows that 5GSBA is efficient for both UEs and base stations with reasonably low computational costs and energy consumption.

摘要

未来的第五代蜂窝网络(5G)不仅支持高速互联网,还必须能够同时连接大量设备,同时不影响网络安全性。为了确保网络的安全性,第三代合作伙伴计划(3GPP)已经为用户设备(UE)、基站和核心网络之间的相互认证标准化了 5G 认证和密钥协商(AKA)协议。然而,已经发现 5G-AKA 容易受到许多攻击,包括可链接性攻击、拒绝服务(DoS)攻击和分布式拒绝服务(DDoS)攻击。为了解决这些安全问题并提高 5G 网络的健壮性,在本文中,我们引入了基于安全区块链的 5G 网络认证和密钥协商(5GSBA)。我们使用区块链作为分布式数据库,将认证功能从集中式服务器分散到所有基站。它可以防止单点故障并增加 DDoS 攻击的难度。此外,为了确保区块链中的数据不能用于设备冒充,我们的方案采用一次性秘密散列函数作为设备秘密密钥。此外,我们的 5GSBA 通过使用订阅隐藏标识符(SUCI)对设备身份进行加密来保护设备匿名性。通过废弃椭圆曲线 Diffie-Hellman(ECDH)中的序列号来防止可链接性攻击。我们使用 Burrows-Abadi-Needham(BAN)逻辑和 Scyther 工具对我们的协议进行正式验证。安全分析表明,5GSBA 在完美前向保密、设备匿名性和相互认证和密钥协商(AKA)方面优于 5G-AKA。此外,它有效地阻止了可链接性攻击、重播攻击,最重要的是,阻止了 DoS 和 DDoS 攻击。最后,性能评估表明,5GSBA 对 UE 和基站都非常高效,具有合理的低计算成本和能耗。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/c2da5aab2ad2/sensors-22-04525-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/fad4c13400ae/sensors-22-04525-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/fe3b8e77b1b7/sensors-22-04525-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/cafcb38d6906/sensors-22-04525-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/67250cc25414/sensors-22-04525-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/88ba20ea6e57/sensors-22-04525-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/1025a21626aa/sensors-22-04525-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/770510b19653/sensors-22-04525-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/242d88531077/sensors-22-04525-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/160e457a5f28/sensors-22-04525-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/626d56c82234/sensors-22-04525-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/c2da5aab2ad2/sensors-22-04525-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/fad4c13400ae/sensors-22-04525-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/fe3b8e77b1b7/sensors-22-04525-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/cafcb38d6906/sensors-22-04525-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/67250cc25414/sensors-22-04525-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/88ba20ea6e57/sensors-22-04525-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/1025a21626aa/sensors-22-04525-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/770510b19653/sensors-22-04525-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/242d88531077/sensors-22-04525-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/160e457a5f28/sensors-22-04525-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/626d56c82234/sensors-22-04525-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e70e/9229231/c2da5aab2ad2/sensors-22-04525-g011.jpg

相似文献

1
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.基于区块链的安全认证和密钥协商方案用于 3GPP5G 网络。
Sensors (Basel). 2022 Jun 15;22(12):4525. doi: 10.3390/s22124525.
2
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks.一种用于5G无线网络中机器类型通信(MTC)设备群组切换的区块链辅助安全协议。
Sensors (Basel). 2024 Apr 6;24(7):2331. doi: 10.3390/s24072331.
3
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.5G-AKA-FS:一种用于前向保密的5G认证与密钥协商协议。
Sensors (Basel). 2023 Dec 27;24(1):159. doi: 10.3390/s24010159.
4
Provably Secure Three-Factor-Based Mutual Authentication Scheme with PUF for Wireless Medical Sensor Networks.基于 PUF 的无线医疗传感器网络三因素互认证协议的可证明安全性
Sensors (Basel). 2021 Sep 9;21(18):6039. doi: 10.3390/s21186039.
5
A Secure LEACH-PRO Protocol Based on Blockchain.基于区块链的安全 LEACH-PRO 协议。
Sensors (Basel). 2022 Nov 2;22(21):8431. doi: 10.3390/s22218431.
6
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments.基于 PUF 的无人机物联网中可证明安全的相互认证和密钥协商方案。
Sensors (Basel). 2023 Feb 10;23(4):2034. doi: 10.3390/s23042034.
7
A Secure Charging System for Electric Vehicles Based on Blockchain.一种基于区块链的电动汽车安全充电系统。
Sensors (Basel). 2019 Jul 9;19(13):3028. doi: 10.3390/s19133028.
8
WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks.WSN-SLAP:无线传感器网络的安全和轻量级相互认证协议。
Sensors (Basel). 2021 Jan 30;21(3):936. doi: 10.3390/s21030936.
9
Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments.面向基于云的物联网环境的可证明安全的轻量级相互认证与密钥协商方案。
Sensors (Basel). 2023 Dec 11;23(24):9766. doi: 10.3390/s23249766.
10
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.用于远程医疗信息系统的基于密码的安全匿名用户认证和会话密钥协商方案。
Comput Methods Programs Biomed. 2016 Oct;135:167-85. doi: 10.1016/j.cmpb.2016.07.028. Epub 2016 Jul 29.

引用本文的文献

1
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks.一种用于5G无线网络中机器类型通信(MTC)设备群组切换的区块链辅助安全协议。
Sensors (Basel). 2024 Apr 6;24(7):2331. doi: 10.3390/s24072331.