信息网络安全 ›› 2021, Vol. 21 ›› Issue (9): 1-7.doi: 10.3969/j.issn.1671-1122.2021.09.001

• 优秀论文 • 上一篇    下一篇

一种面向5G专网鉴权协议的形式化分析方案

王跃东1(), 熊焰1, 黄文超1, 武建双2   

  1. 1.中国科学技术大学计算机科学与技术学院,合肥 230026
    2.合肥天帷信息安全技术有限公司,合肥 230000
  • 收稿日期:2021-04-11 出版日期:2021-09-10 发布日期:2021-09-22
  • 通讯作者: 王跃东 E-mail:ustcwyd@mail.ustc.edu.cn
  • 作者简介:王跃东(1996—),男,山东,硕士研究生,主要研究方向为协议形式化验证|熊焰(1960—),男,安徽,教授,博士,主要研究方向为网络安全、漏洞挖掘、形式化建模|黄文超(1982—),男,湖北,副教授,博士,主要研究方向为网络安全、漏洞挖掘、形式化建模|武建双(1984—),男,山西,硕士,主要研究方向为网络安全等级保护
  • 基金资助:
    国家自然科学基金(61972369);国家重点研发计划(2018YFB2100301)

A Formal Analysis Scheme for 5G Private Network Authentication Protocol

WANG Yuedong1(), XIONG Yan1, HUANG Wenchao1, WU Jianshuang2   

  1. 1. School of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, China
    2. Hefei Tianwei Information Security Technology Co., Ltd., Hefei 230000, China
  • Received:2021-04-11 Online:2021-09-10 Published:2021-09-22
  • Contact: WANG Yuedong E-mail:ustcwyd@mail.ustc.edu.cn

摘要:

文章提出一种面向5G专网鉴权协议EAP-TLS的细粒度形式化建模与验证方案。方案以TS 33.501文档为依据,首先构建基于Diffie-Hellman模式的协议交互模型;然后扩展Dolev-Yao攻击者模型,提出了两种参与方受控场景和混合信道模型;最后使用验证工具SmartVerif验证保密性、认证性、隐私性3类安全属性。实验结果表明,协议在保密性和认证性方面存在3类安全隐患。文章分析了出现安全隐患的根本原因并提出了修订方案,修订后的协议可以满足文章定义的全部安全属性。

关键词: 5G专网, EAP-TLS认证协议, Dolev-Yao攻击者模型, 形式化方法

Abstract:

This paper proposed a fine-grained formal modeling and verification scheme for the 5G EAP-TLS protocol. According to the TS 33.501 document, the scheme first constructed a protocol interaction model based on the Diffie-Hellman mode. Then the scheme expanded the Dolev-Yao model by introducing two participant compromised scenarios and mixed channel model. Finally, the verification tool SmartVerif was used to verify three types of security properties including confidentiality properties, authentication properties, and privacy properties. Experimental results show that the protocol exist safety flaws in terms of confidentiality properties and authentication properties. This paper analyzes the root causes of safety flaws and proposes a revised protocol. The revised protocol can meet all the security properties defined in the paper.

Key words: 5G private network, EAP-TLS authentication protocol, Dolev-Yao attacker model, formal method

中图分类号: