Visible to the public Security Vulnerabilities in Handover Authentication Mechanism of 5G Network

TitleSecurity Vulnerabilities in Handover Authentication Mechanism of 5G Network
Publication TypeConference Paper
Year of Publication2018
AuthorsGupta, S., Parne, B. L., Chaudhari, N. S.
Conference Name2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
Date Publisheddec
Keywords3GPP, 5G communication network, 5G handover, 5G handover key mechanism, 5G handover security analysis, 5G mobile communication, 5g network, authentication, authentication complexity, communication entities, Computer architecture, Fifth Generation mobile telecommunication technology, Handover, handover architecture, handover key mechanism, handover mechanism, inter-gNB handover, inter-gNB handover authentication mechanism, Internet of Things, IoT-based applications, key hierarchy, key resilience problem, message authentication, mobility management (mobile radio), pre-authentication, pubcrawl, Resiliency, Resilient Security Architectures, secret keys, security counter-measures, security demands, security issues, security vulnerabilities, Security weakness, telecommunication security, Third Generation Partnership Project
AbstractThe main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.
DOI10.1109/ICSCCC.2018.8703355
Citation Keygupta_security_2018