信息网络安全 ›› 2024, Vol. 24 ›› Issue (8): 1220-1230.doi: 10.3969/j.issn.1671-1122.2024.08.008

• 理论研究 • 上一篇    下一篇

基于无证书签名的5G系统广播消息身份认证协议

孙中岫1,2, 彭诚1,2(), 范伟1,2   

  1. 1.中国科学院信息工程研究所,北京 100093
    2.中国科学院大学网络空间安全学院,北京 100049
  • 收稿日期:2024-04-25 出版日期:2024-08-10 发布日期:2024-08-22
  • 通讯作者: 彭诚 pengcheng@iie.ac.cn
  • 作者简介:孙中岫(1999—),男,山东,硕士研究生,主要研究方向为网络空间安全、移动通信安全、通信协议分析|彭诚(1994—),男,北京,工程师,博士,主要研究方向为移动通信安全、通信协议分析、微弱信号检测与识别|范伟(1984—),男,北京,高级工程师,博士,CCF会员,主要研究方向为无线通信网络空间安全、区块链安全、微弱信号检测与识别、移动通信信号处理
  • 基金资助:
    国家重点研发计划(2021YFB2700603)

System Broadcast Information Authentication Protocol Based on Certificateless Signature for 5G Network

SUN Zhongxiu1,2, PENG Cheng1,2(), FAN Wei1,2   

  1. 1. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2024-04-25 Online:2024-08-10 Published:2024-08-22

摘要:

5G技术的普及促进了各行业生产力的发展,但5G网络的安全性问题也逐渐凸显,基站作为连接用户设备和核心网的枢纽,其安全性备受关注。由于基站通过广播发送的系统消息缺乏真实性和完整性的保护,攻击者可以通过修改系统消息,吸引用户设备在初始接入或者在小区重选时连接到伪基站,从而发起多种后续攻击。针对这一问题,文章提出了一种基于无证书签名的基站身份认证协议,为用户设备提供了一种验证基站广播系统消息合法性的方法,并从签名消息的选择、签名和验证的开销、抵御重放攻击几个方面进行了优化。仿真实验表明,该协议引入的计算开销是基站和用户设备可以接受的,与现有的基站身份认证协议相比,该协议提高了安全性,实现了更小的签名长度。

关键词: 5G空口, 伪基站, 身份验证, 无证书公钥密码

Abstract:

The popularization of 5G technology has promoted the development of productivity in various industries, but the security of 5G networks has gradually become prominent, and the security of base stations, as a hub connecting user equipment and the core network, has attracted much attention. Due to the lack of authenticity and integrity protection of the system information messages sent by the base station through broadcasting, attackers can modify the system information messages to attract user devices to connect to the fake base station during initial access or cell reselection, so as to launch a variety of subsequent attacks. In order to solve this problem, this paper proposed a base station identity authentication protocol based on certificateless signature, which provided a method for user equipment to verify the legitimacy of base station broadcasting system messages, and optimized the selection of signed messages, the overhead of signing and verification, and the defense against replay attacks. Simulation results show that the computational overhead introduced by this scheme is acceptable to the base station and user equipment, and compared with the existing base station identity authentication protocols, the proposed scheme improves the security and achieves the minimum signature length.

Key words: 5G air interface, pseudo base stations, identity authentication, certificateless public key cryptography

中图分类号: