首页|5G-AKA认证机制脆弱性分析与验证

5G-AKA认证机制脆弱性分析与验证

扫码查看
鉴权认证机制的安全性研究一直是移动通信领域重要的关注点,每一代移动通信标准都制定了不同的认证密钥协议(AKA)。随着5G物联网中接入终端类型和接入场景的多样化,3GPP制定了统一的用户安全接入认证机制5G-AKA,经调研发现该机制仍存在脆弱性。通过分析5G-AKA双向认证流程中的请求参数和响应内容,发现认证流程存在用户身份验证标识(SUPI)泄露的风险,设计了 SUPI窃听攻击模型。同时,基于UERANSIM和open5gs测试平台设计了网络拓扑结构和实验场景,模拟信令流量并验证上述模型。
Vulnerability analysis and verification of 5G-AKA authentication mechanism
Research on the security of authentication mechanism has been an important concern in mobile communication,and each generation of mobile communication standards has developed different authentication and key agreement(AKA).With the diversification of access terminal types and access scenarios in 5G IoT,3GPP has developed an unified user security access authentication mechanism,5G-AKA,which is still found to be vulnerable after investigation.In this paper,by analyzing the request parameters and response contents in the bidirectional authentication process of 5G-AKA,the risk of user authentication identifier(SUPI)leakage is found,and a SUPI eavesdropping attack model is designed.Based on the UERANSIM and open5gs testing platforms,this paper designs the network topology and experimental scenarios,simulating signaling traffic to validate the aforementioned model.

securityauthentication mechanismuser authentication identifier

韩晓璇、周文安、韩震

展开 >

北京邮电大学计算机学院,北京 100876

安全 鉴权认证机制 用户身份验证标识

2024

计算机工程与科学
国防科学技术大学计算机学院

计算机工程与科学

CSTPCD北大核心
影响因子:0.787
ISSN:1007-130X
年,卷(期):2024.46(12)