{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:10:12Z","timestamp":1748668212821,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_2","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"18-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Verification of\u00a05GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9420-7501","authenticated-orcid":false,"given":"Gunwoo","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4905-6912","authenticated-orcid":false,"given":"Yongho","family":"Ko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"2_CR1","unstructured":"3GPP. Authentication and key management for applications (AKMA) based on 3GPP credentials in the 5G system (5GS) TS 33.535 (Release 18). Technical report, The 3rd Generation Partnership Project (June 2023)"},{"key":"2_CR2","unstructured":"3GPP. Security architecture and procedures for 5G system TS33.501 v18.2.0. Technical report, The 3rd Generation Partnership Project (June 2023)"},{"key":"2_CR3","unstructured":"Persson, P., Zaidi, A.,\u00a0Magnusson, S.,\u00a0Osseiran, A.,\u00a0Parkvall, S.,\u00a0Balachandran, K.: 5G wireless access: an overview. Ericsson Whitepaper (April 2022). https:\/\/www.ericsson.com\/en\/reports-and-papers\/white-papers\/5g-wireless-access-an-overview. Accessed 30 September 2023"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: 5G security: analysis of threats and solutions. In: Proceedings of the 3rd IEEE Conference on Standards for Communications and Networking (CSCN 2017), Helsinki, Finland, pp. 193\u2013199. IEEE (September 2017)","DOI":"10.1109\/CSCN.2017.8088621"},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","volume":"21","author":"I Ahmad","year":"2019","unstructured":"Ahmad, I., Shahabuddin, S., Kumar, T., Okwuibe, J., Gurtov, A., Ylianttila, M.: Security for 5G and beyond. IEEE Commun. Surv. Tutorials 21(4), 3682\u20133722 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2_CR6","unstructured":"Arkko, J.,\u00a0Norrman, K., Mattsson, J.P.: Forward secrecy for the extensible authentication protocol method for authentication and key agreement (eap-aka\u2019 fs). IETF Draft draft-ietf-emu-aka-pfs-11 (work-in-progress) (July 2023). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-emu-aka-pfs\/"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., Stettler, V.: A formal analysis of 5G authentication. In: Proceedings of the 25st ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, pp. 1383\u20131396. ACM Press (October 2018)","DOI":"10.1145\/3243734.3243846"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Borgaonkar, R., Hirschi, L., Park, S., Shaik, A.: New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2018\/1175","DOI":"10.2478\/popets-2019-0039"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Boyd, C., Mathuria, A., Stebila, D.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-662-58146-9","DOI":"10.1007\/978-3-662-58146-9"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"13","key":"2_CR11","first-page":"1","volume":"34","author":"T Jager","year":"2021","unstructured":"Jager, T., Slamanig, D., Striecks, C., Derler, D., Gellert, K.: Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. J. Cryptol. 34(13), 1\u201359 (2021)","journal-title":"J. Cryptol."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dutta, A., Hammad, E.: 5G security challenges and opportunities: a system approach. In: Proceedings of the 3rd IEEE 5G World Forum (5GWF 2020), Online, pp. 109\u2013114. IEEE (September 2020)","DOI":"10.1109\/5GWF49715.2020.9221122"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","volume":"101","author":"MA Ferrag","year":"2018","unstructured":"Ferrag, M.A., Maglaras, L., Argyriou, A., Kosmanos, D., Janicke, H.: Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl. 101(1), 55\u201382 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Echeverria, M., Karim, I., Chowdhury, O., Bertino, E.: 5GReasoner: a property-directed security and privacy analysis framework for 5G cellular network protocol. In: Proceedings of the 26st ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), London, United Kingdom, pp. 669\u2013684. ACM Press (November 2019)","DOI":"10.1145\/3319535.3354263"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","volume":"7","author":"Roger Piqueras Jover and Vuk Marojevic","year":"2019","unstructured":"Roger Piqueras Jover and Vuk Marojevic: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956\u201324963 (2019)","journal-title":"IEEE Access"},{"key":"2_CR16","first-page":"1","volume":"28","author":"K Kaska","year":"2019","unstructured":"Kaska, K., Beckvard, H., Min\u00e1rik, T.: Huawei, 5G and china as a security threat. NATO Cooperative Cyber Defence Center Excellence 28, 1\u201326 (2019)","journal-title":"NATO Cooperative Cyber Defence Center Excellence"},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan, R., Kumar, P., Jayakody, D.N.K., Liyanage, M.: A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun. Surv. Tutorials 22(1), 196\u2013248 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2_CR18","unstructured":"K\u00f8ien, G.M.: The SUCI-AKA authentication protocol for 5G systems. In: Proceedings of the 13st NISK Conference on Norwegian Information Security (NISK 2020) (Nobember 2020)"},{"key":"2_CR19","unstructured":"Langley, A.: Protecting data for the long term with forward secrecy. Google (November 2011). https:\/\/security.googleblog.com\/2011\/11\/protecting-data-for-long-term-with.html. Accessed 30 September 2023"},{"key":"2_CR20","unstructured":"Likith, P.,\u00a0Sanna, M.: Impact of 5G and digital transformation on storage. Dell Whitepaper (2021). https:\/\/education.dell.com\/content\/dam\/dell-emc\/documents\/en-us\/2021KS_Meer-Impact_of_5G_and_Digital_Transformation_on_Storage.pdf. Accessed 30 September 2023"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F., Peng, J., Zuo, M.: Toward a secure access to 5G network. In: Proceedings of the 17st IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018)\/ 12th IEEE Conference On Big Data Science And Engineering (TrustCom\/BigDataSE 2018) , New York, NY, USA, pp. 1121\u20131128. IEEE (August 2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00156"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC press (2018)","DOI":"10.1201\/9781439821916"},{"key":"2_CR23","unstructured":"Samsung. [s6gf2022] samsung 6G forum: Live streaming (edit) | samsung. Samsung 6G Forum (June 2022). https:\/\/www.youtube.com\/watch?v=hjXN_dYXLo8. Accessed 30 September 2023"},{"key":"2_CR24","unstructured":"Sui, A., et al.: An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. In: Proceedings of the 6st IEEE Wireless Communications and Networking Conference (WCNC 2005), New Orleans, LA, USA, pp. 2088\u20132093. IEEE (March 2005)"},{"key":"2_CR25","unstructured":"Wang, Y., Zhang, Z., Xie, Y.: Privacy-preserving and standard-compatible aka protocol for 5G. In: Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021), Online, pp. 3595\u20133612. USENIX Association (August 2021)"},{"key":"2_CR26","unstructured":"WebsiteRating. What is perfect forward secrecy? WebsiteRating (May 2023)"},{"issue":"5","key":"2_CR27","doi-asserted-by":"publisher","first-page":"257","DOI":"10.3390\/info13050257","volume":"13","author":"Y Xiao","year":"2022","unstructured":"Xiao, Y., Gao, S.: 5GAKA-LCCO: a secure 5G authentication and key agreement protocol with less communication and computation overhead. Information 13(5), 257 (2022)","journal-title":"Information"},{"issue":"3","key":"2_CR28","doi-asserted-by":"publisher","first-page":"125","DOI":"10.3390\/info13030125","volume":"13","author":"Y Xiao","year":"2022","unstructured":"Xiao, Y., Yang, W.: 5G-IPAKA: an improved primary authentication and key agreement protocol for 5G networks. Information 13(3), 125 (2022)","journal-title":"Information"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:02:16Z","timestamp":1720717336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}