An Enhanced Cross-Network-Slice Authentication Protocol for 5G

被引:2
|
作者
Yadav, Awaneesh Kumar [1 ]
Wijethilaka, Shalitha [2 ]
Braeken, An [3 ]
Misra, Manoj [1 ]
Liyanage, Madhusanka [2 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
[2] Univ Coll Dublin, Sch Comp Sci, Dublin 4, Ireland
[3] Vrije Univ Brussel, Dept Engn Technol INDI, B-1050 Brussels, Belgium
来源
基金
爱尔兰科学基金会;
关键词
Authentication; 5G-AKA; edge computing; Internet of Things (IoT); GNY logic; ROR logic; network slicing; scyther tool; EFFICIENT; SECURITY; SCHEME; ANONYMITY;
D O I
10.1109/TSUSC.2023.3283615
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network slicing is considered one of the key technologies in future telecommunication networks as it can split the physical network into a number of logical networks tailored to diverse purposes that allow users to access various services speedily. The fifth-generation (5G) mobile network can support a variety of applications by using network slicing. However, security (especially authentication) is a significant issue when users access the network slice-based services. Various authentication schemes are designed to secure access, and only a few offer cross-network slice authentication. The security analysis of existing cross-network authentication schemes shows they are vulnerable to several attacks such as device stolen, ephemeral secret leakage, violation of perfect forward secrecy, identity theft. Therefore, we propose an authentication mechanism that offers cross-network slice authentication and prevents all the aforementioned vulnerabilities. The security verification of the authentication mechanism is carried out informally and formally (ROR logic and Scyther tool) to ensure that it handles all the vulnerabilities. The comparison of empirical evaluation shows that the proposed scheme is least costly than its competitors. Java-based implementations of the proposed protocols imitate a real environment, showing that our proposed protocol maintains almost the same performance as state-of-the-art solutions while providing additional security features.
引用
收藏
页码:555 / 573
页数:19
相关论文
共 50 条
  • [41] Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
    Gong, Seonghyeon
    El Azzaoui, Abir
    Cha, Jeonghun
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [42] Authentication and Key Agreement Protocol in Hybrid Edge-Fog-Cloud Computing Enhanced by 5G Networks
    Zhang, Jiayi
    Ouda, Abdelkader
    Abu-Rukba, Raafat
    FUTURE INTERNET, 2024, 16 (06)
  • [43] Network Slicing in 5G Edge Networks with Controlled Slice Redistributions
    Bcra, Samaresh
    Mehta, Neelesh B.
    PROCEEDINGS OF THE 2021 17TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2021): SMART MANAGEMENT FOR FUTURE NETWORKS AND SERVICES, 2021, : 118 - 124
  • [44] Traffic analysis for 5G network slice based on machine learning
    Feng Xie
    Dongxue Wei
    Zhencheng Wang
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [45] Automation of 5G Network Slice Control Functions with Machine Learning
    Kafle V.P.
    Martinez-Julia P.
    Miyazawa T.
    IEEE Communications Standards Magazine, 2019, 3 (03): : 54 - 62
  • [46] A Network Slice Resource Allocation Process in 5G Mobile Networks
    Fendt, Andrea
    Schmelz, Lars Christoph
    Wajda, Wieslawa
    Lohmueller, Simon
    Bauer, Bernhard
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 695 - 704
  • [47] Traffic analysis for 5G network slice based on machine learning
    Xie, Feng
    Wei, Dongxue
    Wang, Zhencheng
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [48] 5G Network Slice Security Trust Degree Calculation Model
    Niu, Ben
    You, Wei
    Tang, Hongbo
    Wang, Xiaolei
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1150 - 1157
  • [49] Survey on Network Slice Isolation in 5G Networks: Fundamental Challenges
    Alotaibi, Daifallah
    LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G, 2021, 182 : 38 - 45
  • [50] Network Slice Selection, Assignment and Routing within 5G Networks
    Choyi, Vinod Kumar
    Abdel-Hamid, Ayman
    Shah, Yogendra
    Ferdi, Samir
    Brusilovsky, Alec
    2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2016,