LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks

2018 ◽  
Vol 32 (3) ◽  
pp. e3860 ◽  
Author(s):  
Jin Cao ◽  
Maode Ma ◽  
Hui Li
2018 ◽  
Vol 14 (2) ◽  
pp. 155014771875658 ◽  
Author(s):  
Tianhan Gao ◽  
Yanqiang Li ◽  
Nan Guo ◽  
Ilsun You

With the rapid booming of intelligent traffic system, vehicular ad hoc networks have attracted wide attention from both academic and industry. However, security is the main obstacle for the wide deployment of vehicular ad hoc networks. Vehicular ad hoc networks security has two critical issues: access authentication and privacy preservation. How to ensure privacy preservation and improve the efficiency of authentication has become the urgent needs. However, the existing access authentication schemes for vehicular ad hoc networks with different flaws cannot maintain the balance between security and efficiency. Thus, an anonymous access authentication scheme for vehicular ad hoc networks under edge computing based on ID-based short group signature mechanism is proposed in this article to improve the efficiency and anonymity of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides, a new method is designed to identify and revoke malicious vehicles in the evaluation manner. The core protocols of the proposed scheme are proved to be secure by SVO logic. According to the computation cost and transmission overhead analysis, we indicate that our scheme owns better performance. Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.


2019 ◽  
Author(s):  
André Fernandes ◽  
Fabricio De Souza Farias ◽  
Aline Ohashi ◽  
Marcos Oliveira ◽  
João Crisostomo Weyl Albuquerque Costa

Fifth generation (5G) cellular networks will be the key element of a society that is becoming increasingly interconnected and digitalized. Applications adopted in many social and industrial sectors will require from 5G networks higher standards of availability and reliability. These requirements are leading operators to plan the deployment of protection schemes in the backhaul layer. In this context, our aim is to employ simulation to assess in a technical and economic way different backhaul protection schemes based on passive optical network (PON). The results indicate that the use of protection can increase the viability of 5G networks based on a PON backhaul supporting a hybrid fronthaul with fiber and copper.


Author(s):  
Giuseppe Araniti ◽  
Massimo Condoluci ◽  
Sara Pizzi ◽  
Antonella Molinaro

In recent years, mobile operators are observing a growing demand of multicast services over radio cellular networks. In this scenario, multicasting is the technology exploited to serve a group of users who simultaneously request the same data content. Since multicast applications are expected to be massively exchanged over the forthcoming fifth generation (5G) systems, the third-generation partnership project (3GPP) defined the multimedia broadcast multicast service (MBMS) standard. MBMS supports multicast services over long-term evolution (LTE), and the 4G wireless technology provides high quality services in mobile environments. Nevertheless, several issues related to the management of MBMS services together with more traditional unicast services are still open. The aim of this chapter is to analyze the main challenges in supporting heterogeneous traffic over LTE with particular attention to resource management, considered as the key aspect for an effective provisioning of mobile multimedia services over cellular networks.


2020 ◽  
Vol 2020 ◽  
pp. 1-19
Author(s):  
Yousheng Zhou ◽  
Longan Wang

In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack.


2012 ◽  
Vol 31 (6) ◽  
pp. 741-749 ◽  
Author(s):  
Anmin Fu ◽  
Yuqing Zhang ◽  
Zhenchao Zhu ◽  
Qi Jing ◽  
Jingyu Feng

2020 ◽  
Vol 69 (5) ◽  
pp. 5403-5415
Author(s):  
Liangjun Song ◽  
Gang Sun ◽  
Hongfang Yu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

Sign in / Sign up

Export Citation Format

Share Document