A Comprehensive Formal Analysis of 5G Handover

Aleksi Peltonen, Ralf Sasse, David Basin

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

8 Citations (Scopus)
159 Downloads (Pure)

Abstract

5G has been under standardization for over a decade and will drive the world's mobile technologies in the decades to come. One of the cornerstones of the 5G standard is its security, also for devices that move frequently between networks, such as autonomous vehicles, and must therefore be handed over from one network operator to another. We present a novel, comprehensive, formal analysis of the security of the device handover protocols specified in the 5G standard. Our analysis covers both handovers within the 5G core network, as well as fallback methods for backwards compatibility with 4G/LTE. We identify four main handover protocols and formally model them in the security protocol verification tool Tamarin. Using these models, we determine for each protocol the minimal set of security assumptions required for its intended security goals to be met. Understanding these requirements is essential when designing devices and other protocols that depend on the reliability and security of network handovers.
Original languageEnglish
Title of host publicationWiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PublisherACM
Pages1-12
Number of pages12
ISBN (Electronic)978-1-4503-8349-3
DOIs
Publication statusPublished - 21 Jun 2021
MoE publication typeA4 Article in a conference publication
EventACM Conference on Security and Privacy in Wireless and Mobile Networks - Abu Dhabi, United Arab Emirates
Duration: 28 Jun 20212 Jul 2021
Conference number: 14

Conference

ConferenceACM Conference on Security and Privacy in Wireless and Mobile Networks
Abbreviated titleWiSec
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period28/06/202102/07/2021

Fingerprint

Dive into the research topics of 'A Comprehensive Formal Analysis of 5G Handover'. Together they form a unique fingerprint.

Cite this