An Enhanced Cross-Network-Slice Authentication Protocol for 5G

被引:2
|
作者
Yadav, Awaneesh Kumar [1 ]
Wijethilaka, Shalitha [2 ]
Braeken, An [3 ]
Misra, Manoj [1 ]
Liyanage, Madhusanka [2 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
[2] Univ Coll Dublin, Sch Comp Sci, Dublin 4, Ireland
[3] Vrije Univ Brussel, Dept Engn Technol INDI, B-1050 Brussels, Belgium
来源
基金
爱尔兰科学基金会;
关键词
Authentication; 5G-AKA; edge computing; Internet of Things (IoT); GNY logic; ROR logic; network slicing; scyther tool; EFFICIENT; SECURITY; SCHEME; ANONYMITY;
D O I
10.1109/TSUSC.2023.3283615
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network slicing is considered one of the key technologies in future telecommunication networks as it can split the physical network into a number of logical networks tailored to diverse purposes that allow users to access various services speedily. The fifth-generation (5G) mobile network can support a variety of applications by using network slicing. However, security (especially authentication) is a significant issue when users access the network slice-based services. Various authentication schemes are designed to secure access, and only a few offer cross-network slice authentication. The security analysis of existing cross-network authentication schemes shows they are vulnerable to several attacks such as device stolen, ephemeral secret leakage, violation of perfect forward secrecy, identity theft. Therefore, we propose an authentication mechanism that offers cross-network slice authentication and prevents all the aforementioned vulnerabilities. The security verification of the authentication mechanism is carried out informally and formally (ROR logic and Scyther tool) to ensure that it handles all the vulnerabilities. The comparison of empirical evaluation shows that the proposed scheme is least costly than its competitors. Java-based implementations of the proposed protocols imitate a real environment, showing that our proposed protocol maintains almost the same performance as state-of-the-art solutions while providing additional security features.
引用
收藏
页码:555 / 573
页数:19
相关论文
共 50 条
  • [1] Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System
    Fan, Chun-, I
    Shih, Yu-Tse
    Huang, Jheng-Jia
    Chiu, Wan-Ru
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 701 - 712
  • [2] Secure Authentication Protocol for 5G Enabled IoT Network
    Sharma, Suraj
    Satapathy, Shaswat
    Singh, Shivani
    Sahu, Amiya Kumar
    Obaidat, Mohammad S.
    Saxena, Sanjay
    Puthal, Deepak
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 621 - 626
  • [3] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,
  • [4] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283
  • [5] A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks
    Sathi, Vipin N.
    Srinivasan, Manikantan
    Thiruvasagam, Prabhu K.
    Chebiyyam, Siva Ram Murthy
    MSWIM'18: PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2018, : 249 - 253
  • [6] Slice Architecture for 5G Core Network
    Choi, Young-il
    Park, Noik
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 571 - 575
  • [7] Network resource model for 5G network and network slice
    Ping J.
    Journal of ICT Standardization, 2019, 7 (02): : 127 - 139
  • [8] Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network
    Ren, Zhe
    Li, Xinghua
    Jiang, Qi
    Cheng, Qingfeng
    Ma, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [10] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)