{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:41Z","timestamp":1766441681522,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472045"],"award-info":[{"award-number":["62472045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China under Grant","award":["2022YFB2902203"],"award-info":[{"award-number":["2022YFB2902203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3744844","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"1634-1648","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3629-0233","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8920-311X","authenticated-orcid":false,"given":"Haotian","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4837-7333","authenticated-orcid":false,"given":"Chi","family":"Ma","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6135-8052","authenticated-orcid":false,"given":"Jingjing","family":"Guan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3181-9362","authenticated-orcid":false,"given":"Junchi","family":"Zeng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0140-8342","authenticated-orcid":false,"given":"Haonan","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4930-5556","authenticated-orcid":false,"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"899","article-title":"Study on the security aspects of the next generation system","volume":"33","author":"GPP.","year":"2017","unstructured":"3GPP. 2017. Study on the security aspects of the next generation system., TR 33.899. V1.3.0.","journal-title":"TR"},{"key":"e_1_3_2_1_2_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2018","unstructured":"3GPP. 2018. Security architecture and procedures for 5G System., TS 33.501. V15.1.0.","journal-title":"TS"},{"key":"e_1_3_2_1_3_1","first-page":"102","article-title":"3G security; Security architecture","volume":"33","author":"GPP.","year":"2024","unstructured":"3GPP. 2024. 3G security; Security architecture., TS 33.102. V18.0.0.","journal-title":"TS"},{"key":"e_1_3_2_1_4_1","first-page":"401","article-title":"3GPP System Architecture Evolution (SAE); Security architecture","volume":"33","author":"GPP.","year":"2024","unstructured":"3GPP. 2024. 3GPP System Architecture Evolution (SAE); Security architecture., TS 33.401. V18.0.0.","journal-title":"TS"},{"key":"e_1_3_2_1_5_1","first-page":"102","article-title":"Characteristics of the Universal Subscriber Identity Module (USIM) application","volume":"31","author":"GPP.","year":"2024","unstructured":"3GPP. 2024. Characteristics of the Universal Subscriber Identity Module (USIM) application., TS 31.102. Version 18.4.0.","journal-title":"TS"},{"key":"e_1_3_2_1_6_1","first-page":"501","article-title":"Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3","volume":"24","author":"GPP.","year":"2024","unstructured":"3GPP. 2024. Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3., TS 24.501. V18.6.0.","journal-title":"TS"},{"key":"e_1_3_2_1_7_1","first-page":"003","article-title":"Numbering, addressing and identification","volume":"23","author":"GPP.","year":"2024","unstructured":"3GPP. 2024a. Numbering, addressing and identification., TS 23.003. V18.5.0.","journal-title":"TS"},{"key":"e_1_3_2_1_8_1","first-page":"502","article-title":"Procedures for the 5G System (5GS)","volume":"23","author":"GPP.","year":"2024","unstructured":"3GPP. 2024b. Procedures for the 5G System (5GS)., TS 23.502. V19.1.0.","journal-title":"TS"},{"key":"e_1_3_2_1_9_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2024","unstructured":"3GPP. 2024c. Security architecture and procedures for 5G System., TS 33.501. V18.5.0.","journal-title":"TS"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623113"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"e_1_3_2_1_12_1","first-page":"1205","article-title":"A USIM compatible 5G AKA protocol with perfect forward secrecy. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1","author":"Arkko Jari","year":"2015","unstructured":"Jari Arkko, Karl Norrman, Mats N\u00e4slund, and Bengt Sahlin. 2015. A USIM compatible 5G AKA protocol with perfect forward secrecy. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1. IEEE, 1205-1209.","journal-title":"IEEE"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3154689"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813662"},{"key":"e_1_3_2_1_16_1","first-page":"179","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Basin David","year":"2021","unstructured":"David Basin, Ralf Sasse, and Jorge Toro-Pozo. 2021a. Card brand mixup attack: bypassing the PIN in non-Visa cards by using them for visa transactions. In 30th USENIX Security Symposium (USENIX Security 21). 179-194."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00037"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0039"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107424"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914941"},{"key":"e_1_3_2_1_22_1","volume-title":"Certicom Research","volume":"2","author":"Brown Daniel RL","year":"2009","unstructured":"Daniel RL Brown. 2009. Sec 1: Elliptic curve cryptography. Certicom Research, Vol. 2 (2009)."},{"key":"e_1_3_2_1_23_1","first-page":"427","volume-title":"USA","author":"Camenisch Jan","year":"2017","unstructured":"Jan Camenisch, Manu Drijvers, and Anja Lehmann. 2017. Anonymous attestation with subverted TPMs. In Advances in Cryptology-CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III 37. Springer, 427-461."},{"key":"e_1_3_2_1_24_1","volume-title":"A survey on security aspects for 3GPP 5G networks","author":"Cao Jin","year":"2019","unstructured":"Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, and Lihui Xiong. 2019. A survey on security aspects for 3GPP 5G networks. IEEE communications surveys & tutorials, Vol. 22, 1 (2019), 170-195."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660328"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.19"},{"key":"e_1_3_2_1_28_1","first-page":"6611","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cremers Cas","year":"2023","unstructured":"Cas Cremers, Alexander Dax, and Aurora Naska. 2023. Formal Analysis of SPDM: Security Protocol and Data Model version 1.2. In 32nd USENIX Security Symposium (USENIX Security 23). 6611-6628."},{"volume-title":"Network and Distributed System Security Symposium.","author":"Cremers C.","key":"e_1_3_2_1_29_1","unstructured":"C. Cremers and M. Dehnel-Wild. 2019. Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. In Network and Distributed System Security Symposium."},{"volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1773-1788","author":"Cremers Cas","key":"e_1_3_2_1_30_1","unstructured":"Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, and Thyla van der Merwe. 2017. A comprehensive symbolic analysis of TLS 1.3. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 1773-1788."},{"volume-title":"2016 IEEE Symposium on Security and Privacy (SP). IEEE, 470-485","author":"Cremers Cas","key":"e_1_3_2_1_31_1","unstructured":"Cas Cremers, Marko Horvat, Sam Scott, and Thyla van der Merwe. 2016. Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 470-485."},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Cremers Cas","year":"2020","unstructured":"Cas Cremers, Benjamin Kiesl, and Niklas Medinger. 2020. A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters. In 29th USENIX Security Symposium (USENIX Security 20). 1-17."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00033"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-191358"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109685"},{"key":"e_1_3_2_1_37_1","volume-title":"Achieving better privacy for the 3GPP AKA protocol. Cryptology ePrint Archive","author":"Fouque Pierre-Alain","year":"2016","unstructured":"Pierre-Alain Fouque, Cristina Onete, and Benjamin Richard. 2016. Achieving better privacy for the 3GPP AKA protocol. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_38_1","unstructured":"Free5GC. 2024. https:\/\/github.com\/free5gc\/free5gc."},{"key":"e_1_3_2_1_39_1","first-page":"33","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Golde Nico","year":"2013","unstructured":"Nico Golde, K\u00e9vin Redon, and Jean-Pierre Seifert. 2013. Let me answer that for you: Exploiting broadcast information in cellular networks. In 22nd USENIX Security Symposium (USENIX Security 13). 33-48."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2843334"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354263"},{"key":"e_1_3_2_1_43_1","first-page":"3547","volume-title":"BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Kim Eunsoo","year":"2023","unstructured":"Eunsoo Kim, Min Woo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, and Insu Yun. 2023. BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software. In 32nd USENIX Security Symposium (USENIX Security 23). 3547-3563."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00041"},{"key":"e_1_3_2_1_45_1","first-page":"3223","volume-title":"SOAP: A Social Authentication Protocol. In 33rd USENIX Security Symposium (USENIX Security 24)","author":"Linker Felix","year":"2024","unstructured":"Felix Linker and David Basin. 2024. SOAP: A Social Authentication Protocol. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 3223-3240. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/linker"},{"key":"e_1_3_2_1_46_1","first-page":"1121","article-title":"Toward a secure access to 5G network. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE)","author":"Liu Fuwen","year":"2018","unstructured":"Fuwen Liu, Jin Peng, and Min Zuo. 2018. Toward a secure access to 5G network. In 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE). IEEE, 1121-1128.","journal-title":"IEEE"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_48_1","unstructured":"The Tamarin Manual. 2024--12--10. https:\/\/tamarin-prover.com\/manual\/index.html."},{"key":"e_1_3_2_1_49_1","volume-title":"3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 140-145","author":"Mawaldi Ikbal","year":"2020","unstructured":"Ikbal Mawaldi, Tides Anugraha, Ishak Ginting, Nyoman Karna, et al., 2020. Experimental Security Analysis for Fake eNodeB Attack on LTE Network. In 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 140-145."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3245071"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108373"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS50601.2020.9342780"},{"key":"e_1_3_2_1_54_1","unstructured":"Tamarin Prover. 2024. https:\/\/github.com\/tamarin-prover\/tamarin-prover."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678890.3678924"},{"key":"e_1_3_2_1_56_1","volume-title":"Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. arXiv preprint arXiv:1510.07563","author":"Shaik Altaf","year":"2015","unstructured":"Altaf Shaik. 2015. Practical attacks against privacy and availability in 4G\/LTE mobile communication systems. arXiv preprint arXiv:1510.07563 (2015)."},{"key":"e_1_3_2_1_57_1","unstructured":"srsRAN_4G. 2024. https:\/\/github.com\/srsran\/srsRAN_4G."},{"key":"e_1_3_2_1_58_1","unstructured":"srsRAN_Project. 2024. https:\/\/github.com\/srsran\/srsRAN_Project."},{"key":"e_1_3_2_1_59_1","unstructured":"USRP B210. 2024. Online Available: https:\/\/www.ettus.com\/product\/details\/UB210-KIT."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813615"},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX Security Symposium. 3595-3612","author":"Wang Yuchen","year":"2021","unstructured":"Yuchen Wang, Zhenfeng Zhang, and Yongquan Xie. 2021. Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. In USENIX Security Symposium. 3595-3612."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560538"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109400"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279330"},{"key":"e_1_3_2_1_65_1","volume-title":"AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. In Network and Distributed System Security Symposium (NDSS).","author":"Yu Hexuan","year":"2023","unstructured":"Hexuan Yu, Changlai Du, Yang Xiao, Angelos Keromytis, Chonggang Wang, Robert Gazda, Y Thomas Hou, and Wenjing Lou. 2023. AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978354"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3744844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:09:15Z","timestamp":1766441355000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":66,"alternative-id":["10.1145\/3719027.3744844","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3744844","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}