Secondary Authentication Method Suitable for 5G-Based Power Terminals and Formal Analysis

Xinyang Hu,Yu Jiang,Aiqun Hu
2023-01-01
Abstract:In the 5G network, the access method of IoT terminals is mainly wireless access. Aiming at the high authentication cost in massive access scenarios, this paper proposes a secondary authentication method based on aggregate signcryption for the secondary authentication of 5G-based power terminals. This method not only ensures the security, but also has the characteristics of less computation and storage consumption, and high operation efficiency. At the same time, it avoids the certificate management problem in traditional public key cryptosystem and the key escrow problem in identity-based public key cryptosystem. In this paper, 5G EAP-TLS authentication protocol suitable for this method is studied. 5G EAP-TLS protocol is mainly used for authentication and key agreement in 5G private networks or IoT scenarios. This paper constructs the 5G EAP-TLS protocol model based on TS 33.501 document, uses ProVerif verification tool to verify the security attributes of the protocol, and proposes a modification scheme.
What problem does this paper attempt to address?