Investigation of security functions in 5G wireless networks
The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with p...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152454 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with previous methods, this method is safer and more effective. In this paper, the security of the SEL-AKA protocol is analyzed, and its time extensibility is simulated by using Python2.7 programming language. In addition, we propose an RTD-AKA protocol based on the SEL-AKA protocol. This is a protocol delay reduction scheme without reducing the security performance of the protocol. The security of the protocol is verified by using the Scyther tool, and the conclusion of reducing the protocol delay is verified by Python 2.7 simulation. Keywords: Security, SEL-AKA protocol, RTD-AKA protocol, Scythe Tool, time ductility |
---|