Implementation Of Efficient 5g Aka Protocol For Light-Weight Environment

Seonghwan Cho,Cheolmin Yeom,Yoojae Won

SUSTAINABILITY(2021)

Cited 2|Views0
No score
Abstract
There is a critical vulnerability in the 5G AKA protocol of the 3GPP. We propose a protocol that compensates for these vulnerabilities and speed up the existing protocol; and the study implements this protocol to experiment with the vulnerabilities. The protocol uses the Light-weight Encryption Algorithm and is expected to be n/3 times faster in than with the application of Advanced Encryption Standard algorithms. By using this algorithm, we improve the protocol efficiently, reduced the power consumed.
More
Translated text
Key words
5G, 5G privacy, security, authentication protocol, 5G AKA protocol, authentication and key agreement, AKA vulnerability, LEA, 3GPP
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined