基于Lowe分類法的5G網(wǎng)絡(luò)EAP-AKA$ ' $ 協(xié)議安全性分析
doi: 10.11999/JEIT190063
-
國(guó)家數(shù)字交換系統(tǒng)工程技術(shù)研究中心 ??鄭州 ??450002
Security Analysis of 5G Network EAP-AKA′ Protocol Based on Lowe’s Taxonomy
-
National Digital Switching System Engineering & Technological R&D Center, Zhengzhou 450002, China
-
摘要: 移動(dòng)網(wǎng)鑒權(quán)認(rèn)證協(xié)議攻擊不斷涌現(xiàn),針對(duì)5G網(wǎng)絡(luò)新協(xié)議EAP-AKA
$ '$ ,該文提出一種基于Lowe分類法的EAP-AKA$ '$ 安全性分析模型。首先對(duì)5G網(wǎng)絡(luò)協(xié)議EAP-AKA$ '$ 、信道及攻擊者進(jìn)行形式化建模。然后對(duì)Lowe鑒權(quán)性質(zhì)進(jìn)行形式化描述,利用TAMARIN證明器分析協(xié)議中安全錨點(diǎn)密鑰KSEAF的Lowe鑒權(quán)性質(zhì)、完美前向保密性、機(jī)密性等安全目標(biāo),發(fā)現(xiàn)了3GPP隱式鑒權(quán)方式下的4條攻擊路徑。最后針對(duì)發(fā)現(xiàn)的安全問題提出2種改進(jìn)方案并驗(yàn)證其有效性,并將5G網(wǎng)絡(luò)兩種鑒權(quán)協(xié)議EAP-AKA$ '$ 和5G AKA的安全性進(jìn)行了對(duì)比,發(fā)現(xiàn)前者在Lowe鑒權(quán)性質(zhì)方面更安全。-
關(guān)鍵詞:
- 網(wǎng)絡(luò)安全 /
- 安全錨點(diǎn)密鑰 /
-
EAP-AKA
$ '$ / - Lowe分類法 /
- Dolev-Yao敵手模型 /
- TAMARIN
Abstract: Mobile network authentication protocol attacks continue to emerge. For the new 5G network protocol EAP-AKA', an EAP-AKA' security analysis method based on Lowe’s taxonomy is proposed. Firstly, 5G network, EAP-AKA', communication channel and adversary are formally modeled. Then Lowe authentication property is formally modeled. Using the TAMARIN prover, objectives of the security anchor key KSEAF are analyzed, such as Lowe’s taxonomy, perfect forward secrecy, confidentiality, etc. Four attack paths under 3GPP implicit authentication mode are discovered. Two improved schemes are proposed for the discovered security problems and their security is verified. Finally, the security of the two authentication protocols EAP-AKA’ and 5G AKA of the 5G network is compared, and it is found that the former is safer in terms of Lowe authentication property.-
Key words:
- Network security /
- Security anchor key /
-
EAP-AKA
$ '$ / - Lowe’s taxonomy /
- Dolev-Yao adversary model /
- TAMARIN
-
表 1 符號(hào)說(shuō)明
符號(hào) 定義 Create(A, id, R) 對(duì)編號(hào)為id的角色A創(chuàng)建一個(gè)事件 Claim_type(A, t) 角色A在時(shí)刻t聲明一個(gè)事件 Honest(A) 角色A不被攻擊者感染 Reveal(A) 角色A被攻擊者感染 K(t) 攻擊者獲取了傳遞的信息 F@i 在時(shí)刻i發(fā)生事件F #i<#j 時(shí)刻i早于時(shí)刻j #i=#j 時(shí)刻i與時(shí)刻j相同 x=y 消息變量x, y相等 下載: 導(dǎo)出CSV
表 2 用spthy語(yǔ)言描述協(xié)議狀態(tài)轉(zhuǎn)移
rule SN_1send: let m = ‘Identity Request’ in [ St_SN_0($SN, ~id, $HN, SK) ] --[ Send($SN, m)]-> [ Out(m), St_SN_1($SN, ~id, $HN, SK)] 下載: 導(dǎo)出CSV
表 3 隱式鑒權(quán)和顯式鑒權(quán)對(duì)比(對(duì)KSEAF的機(jī)密性、完美前向保密性)
協(xié)議參與方 UE SN HN 隱式 顯式 隱式 顯式 隱式 顯式 KSEAF機(jī)密性 √ √ √ √ √ √ KSEAF完美前向保密性 × × × × × × 下載: 導(dǎo)出CSV
表 4 EAP-AKA
$ '$ 和5G AKA對(duì)比(隱式鑒權(quán))協(xié)議參與方 UE對(duì)SN UE對(duì)HN SN對(duì)UE HN對(duì)UE EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA 存活性 √ × √ √ √ √ √ √ 弱一致性 √ × √ √ √ × √ √ 非單射一致性 × × √ × √ × √ × 單射一致性 × × √ × √ × √ × 下載: 導(dǎo)出CSV
表 5 EAP-AKA
$ '$ 和5G AKA對(duì)比(顯式鑒權(quán))協(xié)議參與方 UE對(duì)SN UE對(duì)HN SN對(duì)UE HN對(duì)UE EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA EAP-AKA′ 5G AKA 存活性 √ √ √ √ √ √ √ √ 弱一致性 √ √ √ √ √ √ √ √ 非單射一致性 √ √ √ √ √ √ √ × 單射一致性 √ √ √ √ √ √ √ × 下載: 導(dǎo)出CSV
表 6 改進(jìn)MAC計(jì)算方式
MAC=f1(K, <SQNHN, R, SNN >) 故AUTN=<CONC, f1(K, MAC)> =< SQNHN⊕AK, f1(K, <SQNHN, R, SNN >)> =< SQNHN⊕f5(K, R), f1(K, <SQNHN, R, SNN >)> =KDFAUTN(SQNHN, K, R, SNN) 下載: 導(dǎo)出CSV
-
ARAPINIS M, MANCINI L, RITTER E, et al. New privacy issues in mobile telephony: Fix and verification[C]. Proceedings of 2012 ACM Conference on Computer and Communications Security, Raleigh, North Carolina, USA, 2012: 205–216. HUSSAIN S R, CHOWDHURY O, MEHNAZ S, et al. LTEInspector: A systematic approach for adversarial testing of 4G LTE[C]. Network and Distributed Systems Security (NDSS), San Diego, California, USA, 2018. BORGAONKAR R, HIRSHI L, PARK S, et al. New adventures in spying 3G & 4G users: Locate, track, monitor[EB/OL]. https://www.blackhat.com/docs/us-17/wednesday/us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf, 2017. ZHANG Muxiang and FANG Yuguang. Security analysis and enhancements of 3GPP authentication and key agreement protocol[J]. IEEE Transactions on Wireless Communications, 2005, 4(2): 734–742. doi: 10.1109/twc.2004.842941 RUPPRECHT D, KOHLS K, HOLZ T, et al. Breaking LTE on layer two[C]. The 40th IEEE Symposium on Security and Privacy, San Francisco, USA, 2019. SHAIK A, BORGAONKAR R, SEIFERT J P, et al. Practical attacks against privacy and availability in 4G/LTE[C]. The 23nd Annual Network and Distributed System Security (NDSS), San Diego? California, USA, 2016. HUSSAIN S R, ECHEVERRIA M, CHOWDHURY O, et al. Privacy attacks to the 4G and 5G cellular paging protocols using side channel information[C]. The 23nd Annual Network and Distributed System Security (NDSS), San Diego? California, USA, 2019. RAVISHANKAR B, LUCCA H, SHINJO P, et al. New privacy threat on 3G, 4G, and upcoming 5G AKA protocols[C]. Privacy Enhancing Technologies, Stockholm, Sweden, 2019. BASIN D, DREIER J, HIRSCHI L, et al. A formal analysis of 5G authentication[C]. 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 2018: 1383–1396. KOUTSOS A. The 5G-AKA authentication protocol privacy[EB/OL]. https://arxiv.org/pdf/1811.06922.pdf, 2019. FERRAG M A, MAGLARAS L, ARGYRIOU A, et al. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes[J]. Journal of Network and Computer Applications, 2018, 101: 55–82. doi: 10.1016/j.jnca.2017.10.017 RUPPRECHT D, DABROWSKI A, HOLZ T, et al. On security research towards future mobile network generations[J]. IEEE Communications Surveys & Tutorials, 2018, 20(3): 2518–2542. doi: 10.1109/COMST.2018.2820728 JI Xinsheng, HUANG Kaizhi, JIN Liang, et al. Overview of 5G security technology[J]. Science China Information Sciences, 2018, 61(8): 081301. doi: 10.1007/s11432-017-9426-4 劉彩霞, 李凌書, 湯紅波, 等. 基于子圖同構(gòu)的vEPC虛擬網(wǎng)絡(luò)分層協(xié)同映射算法[J]. 電子與信息學(xué)報(bào), 2017, 39(5): 1170–1177. doi: 10.11999/JEIT160642LIU Caixia, LI Lingshu, TANG Hongbo, et al. Hierarchical coordination strategy for vEPC virtual network embedding based on subgraph isomorphism[J]. Journal of Electronics &Information Technology, 2017, 39(5): 1170–1177. doi: 10.11999/JEIT160642 DOLEV D and YAO A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198–208. doi: 10.1109/TIT.1983.1056650 LOWE G. A hierarchy of authentication specifications[C]. The 10th Computer Security Foundations Workshop, Rockport, USA, 1997: 31–43. 3GPP. 3GPP TS 33.501 Security architecture and procedures for 5G system (Release 15)[S].Nice: 3GPP, 2018. -