An Efficient Authentication Protocol for 5G Heterogeneous Networks

被引:11
|
作者
El Hajjaji El Idrissi, Younes [1 ]
Zahid, Noureddine [1 ]
Jedra, Mohamed [1 ]
机构
[1] Fac Sci Rabat, Lab Concept & Syst, Ave Ibn Batouta,BP 1014, Rabat, Morocco
来源
关键词
5G; LTE; EAP; AKA; Authentication; Handover; ECDH;
D O I
10.1007/978-3-319-68179-5_43
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network security is an important service in the evolution of mobile communication technologies. The user authentication and key agreement process in 2G, 3G and 4G generations have tried to cover all security requirements. However, the deployed Authentication and Key Agreement (AKA) protocol suffers from several security and performance weaknesses, such as, user identity disclosing, high authentication delay and bandwidth consumption. All these, impact negatively the handover process and the quality of service. The new 5G network technology will utilize a basic 5G access authentication similar to the current 4G/ LTE platform. This new technology creates novel security challenges that the next generation of AKA must support. In addition, the authentication protocol must address the newly discovered security weaknesses that have been exposed in the present networks. In this paper we propose an enhancement of existed AKA protocol to improve authentication and authorization in 5G networks by using new key framework based on the Elliptic Curve Cryptosystem (ECC). Our key framework will improve the performance and will achieve fast re-authentication during the handover. The security properties of the proposed method are checked by using formal verification (AVISPA) which has proved a high talent in automatically finding potential attacks in security protocols.
引用
收藏
页码:496 / 508
页数:13
相关论文
共 50 条
  • [1] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [2] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful J.
    Ali, Borhanuddin M.
    Jamalipour, Abbas
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [3] A secure and efficient handover authentication and key management protocol for 5G networks
    Huang, Jia Qi
    Qian, Yi
    [J]. Journal of Communications and Information Networks, 2020, 5 (01): : 40 - 49
  • [4] A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
    Miao, Junfeng
    Wang, Zhaoshun
    Miao, Xue
    Xing, Longyue
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [5] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [6] A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks
    Yan, Xiaobei
    Ma, Maude
    Su, Rong
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1678 - 1684
  • [7] An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    [J]. IET INFORMATION SECURITY, 2020, 14 (01) : 21 - 29
  • [8] Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian
    Huang, Chin-Tser
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [9] Efficient handover protocol for 5G and beyond networks
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [10] Efficient privacy protection authentication protocol for vehicle network in 5G
    Zhang, Guixian
    Zhao, Xiaoyu
    Chen, Menglu
    Ma, Shuyi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022,