Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives

10Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The fifth generation (5G) technology offers a set of security services in order to provide secure communication to a large number of various devices. 5G Authentication and Key Agreement (5G-AKA) authentication service acts as the first step of securing the 5G network communication. This paper aims to quantitatively analyze the dependability of 5G-AKA authentication service. We develop the continuous-time Markov chain (CTMC) models to capture the operational details of the 5G-AKA authentication services when facing the service failure. We also derive formulas for calculating metrics of interest, including Defects Per Million (DPM), authentication service's first restoration time from failure and total cost of ownership (TCO). Extensive numerical analysis is applied to investigate the impact of parameters on the evaluation metrics.

Cite

CITATION STYLE

APA

Jiang, L., Chang, X., Bai, J., Misic, J., Misic, V., & Chen, Z. (2020). Dependability Analysis of 5G-AKA Authentication Service from Server and User Perspectives. IEEE Access, 8, 89562–89574. https://doi.org/10.1109/ACCESS.2020.2993111

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free