A Formal Analysis of 5G Authentication
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=Ksi5uRZi70g
We provide the first comprehensive formal model of a protocol from the AKA family: 5G AKA. We also extract precise requirements from the 3GPP standards defining 5G and we identify missing security goals. Using the security protocol verification tool Tamarin, we conduct a full, systematic, security evaluation of the model with respect to the 5G security goals. • Read this paper in the ACM Digital Library: https://dl.acm.org/citation.cfm?id=32...
#############################
