Efficient handover protocol for 5G and beyond networks

被引:23
|
作者
Nyangaresi, Vincent Omollo [1 ]
Rodrigues, Anthony Joachim [2 ]
机构
[1] Tom Mboya Univ Coll, Fac Biol & Phys Sci, Homabay, Kenya
[2] Jaram Oginga Odinga Univ Sci & Technol, Sch Informat & Innovat Syst, Bondo, Kenya
关键词
Attacks; authentication; handovers; key agreement; latencies; privacy; security; FUZZY-LOGIC; ALGORITHM; MANAGEMENT;
D O I
10.1016/j.cose.2021.102546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as vehicular communications, internet of everything (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and handover authentications present some challenges. To facilitate seamless connectivity in 5G and B5G networks, numerous machine learning schemes have been developed to facilitate target cell selection based on parameters such as signal strength and signal to noise ratio (SNR). However, most of these approaches concentrate on performance enhancements, ignoring security and privacy issues. On their part, majority of the conventional handover authentication schemes exhibit long latencies which contravenes 5G and B5G requirements. Moreover, the base stations in these networks have very small footprints and hence require the deployment of numerous base stations within the coverage area. This serves to compound performance, security and privacy issues due to the resulting frequent handovers. In this paper, a multilayer neural network (MLNN) privacy and security preservation protocol is presented. To facilitate target cell selection, parameters that took user satisfaction, network, user equipment (UE) and service requirements into consideration were deployed so as to enhance both quality of service (QoS) and quality of experience (QoE) during and after handover. For handover security, timestamps, ephemerals and random nonces were deployed during handover authentication to offer both security and privacy. Formal security analysis using Burrows-Abadi-Needham (BAN) showed that the proposed protocol offered strong mutual authentication among the communicating entities. On the other hand, informal security analysis showed that the proposed protocol offers perfect forward key secrecy and is robust against attacks such as impersonation and packet replays. In addition, performance evaluation showed that it has the lowest communication costs and average computation overheads. Moreover, it exhibited a 27.1% increase in handover success rate, and a 24.1% reduction in ping pong rate. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] ANN-FL Secure Handover Protocol for 5G and Beyond Networks
    Nyangaresi, Vincent O.
    Rodrigues, Anthony J.
    Abeka, Silvance O.
    [J]. TOWARDS NEW E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2020, 2021, 361 : 99 - 118
  • [2] Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
    Sharma, Vishal
    You, Ilsun
    Leu, Fang-Yie
    Atiquzzaman, Mohammed
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 102 : 38 - 57
  • [3] Achieving Efficient and Secure Handover in LEO Constellation-Assisted Beyond 5G Networks
    Kong, Qinglei
    Lu, Rongxing
    Yin, Feng
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 : 641 - 653
  • [4] A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks
    Yan, Xiaobei
    Ma, Maude
    Su, Rong
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1678 - 1684
  • [5] Effectiveness of Handover Control Parameters on Handover Performance in 5G and beyond Mobile Networks
    Alraih, Saddam
    Nordin, Rosdiadee
    Shayea, Ibraheem
    Abdullah, Nor Fadzilah
    Abu-Samah, Asma
    Alhammadi, Abdulraqeb
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [6] Measurement Configuration Strategy for Decoupled Handover in Beyond 5G Networks
    A. Saraswathi Priyadharshini
    S. Mary Saira Bhanu
    [J]. Wireless Personal Communications, 2023, 129 : 1735 - 1751
  • [7] Measurement Configuration Strategy for Decoupled Handover in Beyond 5G Networks
    Priyadharshini, A. Saraswathi
    Bhanu, S. Mary Saira
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (03) : 1735 - 1751
  • [8] Efficient Handover Algorithm in 5G Networks using Deep Learning
    Huang, Zhi-Hong
    Hsu, Yi-Lin
    Chang, Pu-Kang
    Tsai, Ming-Jer
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [9] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [10] Ping-Pong Handover Effect Reduction in 5G and Beyond Networks
    Alraih, Saddam
    Nordin, Rosdiadee
    Shayea, Ibraheem
    Abdullah, Nor Fadzilah
    Alhammadi, Abdulraqeb
    [J]. 2021 IEEE WORKSHOP ON MICROWAVE THEORY AND TECHNIQUES IN WIRELESS COMMUNICATIONS, MTTW'21, 2021, : 97 - 101