Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AKA authentication method and system for 5G communication

An authentication method and authentication vector technology, applied in the field of 5GAKA authentication methods and systems, can solve the problems of lack of security protection, user data theft, fraudulent use by attackers, etc., to prevent user data leakage, prevent theft of key information, The effect of improving safety

Active Publication Date: 2022-04-12
JINAN INST OF QUANTUM TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005](1) When UDM / ARFP sends authentication vector 5G HE AV to AUSF, there is no security protection, because 5G HE AV contains expected response value XRES* and key Kausf , where XRES* will be used for user identity authentication. Once leaked, it will cause problems such as attackers fraudulently using user authentication information to access the network; the key Kausf will be used to derive Kseaf and subsequent encryption protection between users and the core network. Integrity protection and other related keys. Once the key is attacked or leaked, it will pose a security threat to the data transmission between the user and the core network, resulting in the theft or tampering of user data.
[0006](2) During 5G AKA authentication, AUSF did not carry out security protection when sending Kseaf to SEAF, because Kseaf will also be used to deduce the relationship between subsequent users and the core network Encryption protection and integrity protection and other related keys, once the key is attacked or leaked, it will pose a security threat to the data transmission between the user and the core network, resulting in the theft or tampering of user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AKA authentication method and system for 5G communication
  • AKA authentication method and system for 5G communication
  • AKA authentication method and system for 5G communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Embodiment 1 of the present invention provides an AKA authentication method for 5G communication, which uses quantum keys to encrypt data transmission between 5G core network elements, and quantum keys can use quantum key distribution technology for 5G core network Shared quantum keys are distributed between network elements. Since quantum key distribution is based on quantum mechanics, it cannot be stolen and has true randomness. It can solve the problem of keys being stolen or cracked during the distribution process and improve key security. It can also securely distribute the quantum random number generated by the quantum random number server to network elements, and use it as a shared quantum key with high randomness.

[0067] During the main authentication and key negotiation process between the user equipment UE and the 5G core network, the mutual authentication between the UE and the network will be completed, and the key used between the UE and the serving networ...

Embodiment 2

[0103] Embodiment 2 of the present invention provides a 5G AKA authentication system based on a shared key. In the 5G AKA authentication process, the 5G core network elements mainly involved include: SEAF (Security Anchor Function), AUSF (Authentication Server Function), UDM / ARFP (unified data management / authentication credential repository and processing functions).

[0104] Such as Figure 4 As shown, according to the actual deployment of the above three network elements, the corresponding quantum key distribution network is deployed, and the three network elements are connected to the three nodes of the quantum key distribution network to obtain the shared quantum key.

[0105] Among them, node 1 and node 2 of the quantum key distribution network can distribute the shared quantum key through the quantum key distribution technology, and provide the shared quantum key to the network elements SEAF and AUSF respectively in a secure manner, then SEAF A shared quantum key will b...

Embodiment 3

[0108] Embodiment 3 of the present invention provides a 5G AKA authentication system based on a shared key. In the 5G AKA authentication process, the 5G core network elements mainly involved include: SEAF (Security Anchor Function), AUSF (Authentication Server Function), UDM / ARFP (unified data management / authentication credential repository and processing functions).

[0109] Connect the three network elements to the quantum random number server, preferably using a device-independent quantum random number server with high security, and obtain the shared quantum random number as an encryption key in a safe way, such as Figure 5 shown.

[0110] The quantum random number server distributes the common random number Rand1 between SEAF and AUSF in a secure way, and distributes the common random number Rand2 between AUSF and UDM / ARFP. The distribution method in the random number distribution process can use quantum key distribution technology The distributed shared quantum key is e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an AKA authentication method and system for 5G communication, and the method comprises the steps: encrypting data transmission between network elements of a 5G core network through employing a quantum key, and enabling the quantum key to distribute a shared quantum key between the network elements of the 5G core network through employing a quantum key distribution technology; the quantum random number generated by the quantum random number server can also be safely distributed among the network elements to be used as a shared quantum key; in the process of main authentication and key negotiation between user equipment (UE) and a 5G network, mutual authentication between the UE and the network is completed, and a key used between the UE and a service network in the subsequent communication process is negotiated; in the authentication and key negotiation process, key data, especially key data, in the authentication message are encrypted and protected by using a shared quantum key between network elements of the 5G core network, so that the security of the key negotiation process is greatly improved, and information leakage caused by key leakage in the process of transmitting information by using the 5G network by a user can be prevented.

Description

technical field [0001] The present invention relates to the technical field of quantum communication and 5G mobile communication, in particular to a 5G AKA authentication method and system. Background technique [0002] The statements in this section merely provide background art related to the present invention and do not necessarily constitute prior art. [0003] In the existing 5G authentication method 5G AKA, during the authentication process, the data transmission between the core network elements is transmitted in plain text without encryption protection, and key data such as Kausf and Kseaf need to be transmitted during the authentication process. These keys are used An anchor key for subsequent communication keys. Once an attacker eavesdrops on the AKA authentication process, the anchor key can be obtained, thereby deriving various subsequent protection keys, threatening the security of the 5G network and causing user information leakage . [0004] According to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/0431H04W12/0433H04W12/06H04L9/08
Inventor 王琳周飞高洁
Owner JINAN INST OF QUANTUM TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More