Abstract
The next generation of mobile networks, 5G, is expected to support a set of multiple requirements and use cases that will create an improved user experience. 5G will also be able to provide a high level of security by considering a variety of security aspects, such as authentication and access control mechanisms. The current protocol in 4G designed to address security is 4G AKA. It presents some weaknesses and vulnerabilities that negatively affect operators’ networks and their subscribers’ security. In designing an authentication and access control mechanism for 5G, it is crucial to evaluate both 4G AKA’s weaknesses and the new requirements of 5G. In this paper, we survey the vulnerabilities of the 4G AKA protocol, as well as the current 5G architectural answers brought by the 3GPP.
| Original language | English |
|---|---|
| Pages (from-to) | 593-603 |
| Number of pages | 11 |
| Journal | Annales des Telecommunications/Annals of Telecommunications |
| Volume | 74 |
| Issue number | 9-10 |
| DOIs | |
| Publication status | Published - 1 Oct 2019 |
| Externally published | Yes |
Keywords
- 5G, mobile network
- AKA protocol
- Authentication and access control