Authors:
            
                    Rosario Giustolisi
                    
                        
                    
                     and
                
                    Christian Gehrmann
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    Swedish Institute of Computer Science, Sweden
                
        
        
        
        
        
             Keyword(s):
            5G, Internet of Things, AKA, EPS-AKA, LTE, Threat Model, Threat Analysis, Security Analysis.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Identification, Authentication and Non-Repudiation
                    ; 
                        Information and Systems Security
                    ; 
                        Network Security
                    ; 
                        Security and Privacy in Mobile Systems
                    ; 
                        Security Protocols
                    ; 
                        Wireless Network Security
                    
            
        
        
            
                Abstract: 
                The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, a new group-based AKA protocol is expected to be one of the security enhancement introduced in 5G. In this paper, we advance the group-based AKA threat model, reflecting previously neglected security risks. The threat model presented in the paper paves the way for the design of more secure protocols.