| Due to the open nature of wireless channels,mobile networks require additional security protocols to ensure communication security.Among them,the authentication and key agreement(AKA)protocol not only provides mutual authentication between the user equipment and the mobile network,but also can negotiate a shared key,which is used to ensure the information transmission security of the mobile network in the air interface(referred to as the air interface)and the user Privacy-based security protocols.However,even the 5G-AKA protocol used by the fifthgeneration mobile communication system does not consider the physical layer properties of the network,and still only uses conventional cryptographic techniques,which has some vulnerabilities,such as a variety of attacks caused by the serial number(SQN)mechanism,and high overhead of calculation and key management.This paper uses the combination of physical layer security mechanism and upper layer cryptography technology to solve the above problems.The basic idea is that the physical layer key is directly related to the communication device and the corresponding environment,and it is difficult to be simulated by an attacker.At the same time,the generation of the physical layer key comes from channel estimation and device feature estimation generally without additional overhead.Therefore,this paper designs a cross-layer authentication protocol for mobile networks by using the characteristics of physical layer keys and cryptographic algorithms to realize the functions of two-way authentication and key negotiation between user equipment and mobile networks.The specific work includes:(1)Based on reasonable security assumptions and security objectives provided by standards,the security of the currently used mobile authentication protocols is summarized,and the existing security problems and possible attacks are summarized.(2)A cross-layer authentication protocol based on physical layer key generation technology is proposed,and the communication process of this protocol is described in detail,including the stage of physical layer key generation and the two-way authentication and key negotiation between users and the network stage,and analyzed the security advantages of the cross-layer authentication protocol compared with the original protocol.(3)The formal modeling of the process and security objectives of the proposed cross-layer authentication protocol is completed,and the security objectives of the proposed cross-layer authentication protocol are analyzed by using the formal analysis tool Tamarin and manual analysis method.The results of the analysis show that the cross-layer authentication protocol satisfies the security objectives. |