作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2025, Vol. 51 ›› Issue (6): 204-211. doi: 10.19678/j.issn.1000-3428.0069175

• 网络空间安全 • 上一篇    下一篇

SAP-AKA二次认证协议的形式化验证与改进

彭程炜, 杨晋吉*(), 杨光   

  1. 华南师范大学计算机学院,广东 广州 510631
  • 收稿日期:2024-01-04 出版日期:2025-06-15 发布日期:2025-06-05
  • 通讯作者: 杨晋吉
  • 基金资助:
    广东省自然科学基金(2020A1515010445)

Formal Verification and Improvement of SAP-AKA Secondary Authentication Protocol

PENG Chengwei, YANG Jinji*(), YANG Guang   

  1. School of Computer Science, South China Normal University, Guangzhou 510631, Guangdong, China
  • Received:2024-01-04 Online:2025-06-15 Published:2025-06-05
  • Contact: YANG Jinji

摘要:

SAP-AKA协议是根据第3代合作项目(3GPP)标准定义的基于可扩展身份认证(EAP)框架, 为垂直用户提供密钥服务安全的二次认证协议,在5G实际环境中,认证与密钥协商协议受到各种网络攻击的影响,导致非法访问、无法认证以及身份信息泄露,在面临巨大安全挑战下SAP-AKA协议的安全属性能否满足要求仍未知。为此, 采用概率模型检测方法对SAP-AKA协议建立形式化模型,在协议交互状态迁移中引入攻击率,定量分析攻击率对协议的影响程度,使用概率计算树逻辑描述协议属性,并利用概率模型检测工具PRISM对协议的安全属性进行定量形式化分析。实验结果表明,SAP-AKA协议的时延性、认证性和完整性在不同程度上受各实体间攻击率的影响,随着攻击率变大,协议的安全属性不再满足要求。最后根据实验结果分析造成安全缺陷的原因,提出了改进方案并进行形式化验证,协议的安全属性均得到有效提升。

关键词: 概率模型检测, 认证协议, SAP-AKA协议, 形式化验证, PRISM工具

Abstract:

The SAP-AKA protocol is a secondary authentication protocol that provides key service security for vertical users, based on the Extensible Authentication Protocol (EAP) framework defined by the 3rd Generation Partnership Project(3GPP)standard. In an actual 5G environment, authentication and key negotiation protocols are subject to various network attacks, resulting in illegal access, authentication failure, and identity information leakage. It is uncertain whether the security attributes of the SAP-AKA protocol meet the requirements under major security challenges. This study establishes a formal model of the SAP-AKA protocol using a probabilistic model checking method. The attack rate is introduced during the protocol interaction state transition to quantitatively analyze the degree of impact of the attack rate on the protocol. The protocol properties are described using probabilistic computation tree logic, and the security properties of the protocol are subjected to a quantitative formal analysis using the PRISM probabilistic model-checking tool. The experimental results show that the timeliness, authentication, and integrity of the SAP-AKA protocol are affected by the attack rate among different entities to varying degrees, and the security attributes of the protocol no longer meet the requirements as the attack rate increases. Finally, based on the experimental results, the causes of security defects are analyzed, and an improvement scheme is proposed and formalized. The security attributes of the protocol are effectively improved.

Key words: probabilistic model checking, authentication protocol, SAP-AKA protocol, formal verification, PRISM tool