Investigation of security functions in 5G wireless networks
The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with p...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152454 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-152454 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1524542023-07-04T16:27:05Z Investigation of security functions in 5G wireless networks Yan, Ruoda Ma Maode School of Electrical and Electronic Engineering EMDMa@ntu.edu.sg Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with previous methods, this method is safer and more effective. In this paper, the security of the SEL-AKA protocol is analyzed, and its time extensibility is simulated by using Python2.7 programming language. In addition, we propose an RTD-AKA protocol based on the SEL-AKA protocol. This is a protocol delay reduction scheme without reducing the security performance of the protocol. The security of the protocol is verified by using the Scyther tool, and the conclusion of reducing the protocol delay is verified by Python 2.7 simulation. Keywords: Security, SEL-AKA protocol, RTD-AKA protocol, Scythe Tool, time ductility Master of Science (Communications Engineering) 2021-08-16T04:46:27Z 2021-08-16T04:46:27Z 2021 Thesis-Master by Coursework Yan, R. (2021). Investigation of security functions in 5G wireless networks. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/152454 https://hdl.handle.net/10356/152454 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
spellingShingle |
Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Yan, Ruoda Investigation of security functions in 5G wireless networks |
description |
The attacks against the mobile network security protocols are constantly emerging, and improving the security of the protocols has become the main demand of users. 3GPP published its 5G security specification in 2018. In 2019, the SEL-AKA security protocol was proposed on this basis. Compared with previous methods, this method is safer and more effective. In this paper, the security of the SEL-AKA protocol is analyzed, and its time extensibility is simulated by using Python2.7 programming language. In addition, we propose an RTD-AKA protocol based on the SEL-AKA protocol. This is a protocol delay reduction scheme without reducing the security performance of the protocol. The security of the protocol is verified by using the Scyther tool, and the conclusion of reducing the protocol delay is verified by Python 2.7 simulation. Keywords: Security, SEL-AKA protocol, RTD-AKA protocol, Scythe Tool, time ductility |
author2 |
Ma Maode |
author_facet |
Ma Maode Yan, Ruoda |
format |
Thesis-Master by Coursework |
author |
Yan, Ruoda |
author_sort |
Yan, Ruoda |
title |
Investigation of security functions in 5G wireless networks |
title_short |
Investigation of security functions in 5G wireless networks |
title_full |
Investigation of security functions in 5G wireless networks |
title_fullStr |
Investigation of security functions in 5G wireless networks |
title_full_unstemmed |
Investigation of security functions in 5G wireless networks |
title_sort |
investigation of security functions in 5g wireless networks |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/152454 |
_version_ |
1772825901812154368 |