A survey on authentication and access control for mobile networks: from 4G to 5G

Research output: Contribution to journalArticlepeer-review

Abstract

The next generation of mobile networks, 5G, is expected to support a set of multiple requirements and use cases that will create an improved user experience. 5G will also be able to provide a high level of security by considering a variety of security aspects, such as authentication and access control mechanisms. The current protocol in 4G designed to address security is 4G AKA. It presents some weaknesses and vulnerabilities that negatively affect operators’ networks and their subscribers’ security. In designing an authentication and access control mechanism for 5G, it is crucial to evaluate both 4G AKA’s weaknesses and the new requirements of 5G. In this paper, we survey the vulnerabilities of the 4G AKA protocol, as well as the current 5G architectural answers brought by the 3GPP.

Original languageEnglish
Pages (from-to)593-603
Number of pages11
JournalAnnales des Telecommunications/Annals of Telecommunications
Volume74
Issue number9-10
DOIs
Publication statusPublished - 1 Oct 2019
Externally publishedYes

Keywords

  • 5G, mobile network
  • AKA protocol
  • Authentication and access control

Fingerprint

Dive into the research topics of 'A survey on authentication and access control for mobile networks: from 4G to 5G'. Together they form a unique fingerprint.

Cite this