Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks

被引:15
|
作者
Alezabi, Kamal Ali [1 ]
Hashim, Fazirulhisyam [2 ,3 ]
Hashim, Shaiful J. [2 ,3 ]
Ali, Borhanuddin M. [2 ,3 ]
Jamalipour, Abbas [4 ]
机构
[1] UCSI Univ, Inst Comp Sci & Digital Innovat, Cheras Kuala Lumpur 56000, Malaysia
[2] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Fac Engn, Serdang 43400, Selangor, Malaysia
[3] Univ Putra Malaysia, Ctr Excellence Wireless & Photon Networks WiPNET, Fac Engn, Serdang 43400, Selangor, Malaysia
[4] Univ Sydney, Fac Engn & Informat Technol, Sydney, NSW, Australia
关键词
5G; EAP-AKA (') authentication; Fast re-authentication; AVISPA; SECURE;
D O I
10.1186/s13638-020-01702-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.
引用
收藏
页数:34
相关论文
共 50 条
  • [1] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [2] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [3] A survey on authentication and access control for mobile networks: from 4G to 5G
    Shanay Behrad
    Emmanuel Bertin
    Noel Crespi
    [J]. Annals of Telecommunications, 2019, 74 : 593 - 603
  • [4] A survey on authentication and access control for mobile networks: from 4G to 5G
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    [J]. ANNALS OF TELECOMMUNICATIONS, 2019, 74 (9-10) : 593 - 603
  • [5] Securing Authentication for Mobile Networks, A Survey on 4G issues and 5G answers
    Behrad, Shanay
    Bertin, Emmanuel
    Crespi, Noel
    [J]. 2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2018,
  • [6] Location based Authentication Service using 4G/5G Devices
    Nisar, Farhan
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 120 - 126
  • [7] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [8] Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian
    Huang, Chin-Tser
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [9] An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks
    Alezabi, Kamal Ali
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Ali, Borhanuddin M.
    [J]. 2014 IEEE REGION 10 SYMPOSIUM, 2014, : 502 - 507
  • [10] A Vulnerability in 5G Authentication Protocols and Its Countermeasure
    Hu, Xinxin
    Liu, Caixia
    Liu, Shuxin
    Li, Jinsong
    Cheng, Xiaotao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (08): : 1806 - 1809