Investigation of security functions in 5G wireless networks

The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with p...

Full description

Saved in:
Bibliographic Details
Main Author: Yan, Ruoda
Other Authors: Ma Maode
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/152454
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with previous methods, this method is safer and more effective. In this paper, the security of the SEL-AKA protocol is analyzed, and its time extensibility is simulated by using Python2.7 programming language. In addition, we propose an RTD-AKA protocol based on the SEL-AKA protocol. This is a protocol delay reduction scheme without reducing the security performance of the protocol. The security of the protocol is verified by using the Scyther tool, and the conclusion of reducing the protocol delay is verified by Python 2.7 simulation. Keywords: Security, SEL-AKA protocol, RTD-AKA protocol, Scythe Tool, time ductility