A lightweight and secure handover authentication scheme for 5G network using neighbor base stations

Author(s):  
Xiaobei Yan ◽  
Maode Ma
2019 ◽  
Vol 23 (10) ◽  
pp. 1692-1695
Author(s):  
Qingxuan Wang ◽  
Chi Cheng ◽  
Ling Zuo

2012 ◽  
Vol 31 (6) ◽  
pp. 741-749 ◽  
Author(s):  
Anmin Fu ◽  
Yuqing Zhang ◽  
Zhenchao Zhu ◽  
Qi Jing ◽  
Jingyu Feng

Author(s):  
Ulil Surtia Zulpratita

[Id] Proses kelengkapan standarisasi teknologi 5G diharapkan akan selesai sebelum Oktober 2020. Resminya standarisasi ini akan menjadi hal penting untuk komersialisasi jaringan 5G. Teknologi 5G diprediksi akan membutuhkan transformasi akan kebutuhan frekuensi carrier yang sangat tinggi dengan bandwidth yang sangat lebar, densitas ekstrim untuk berbagai divais dan base station, serta sejumlah besar antena. 5G tidak akan menjadi antarmuka udara tunggal sebagaimana pada model generasi sebelumnya. 5G diprediksi akan sangat integratif: jalinan koneksi antarmuka udara dan spektrum 5G bersama-sama dengan teknologi nirkabel yang sudah ada (misalnya: LTE dan WiFi) akan memberikan layanan dengan pesat data tinggi dan cakupan luas, serta menjamin terwujudnya pengalaman pengguna tanpa hambatan. Untuk mendukung hal tersebut, di bagian core network harus berevolusi untuk mencapai tingkat belum pernah terjadi sebelumnya dalam hal fleksibilitas dan kecerdasan, regulasi spektrum perlu dikaji kembali dan direvisi, masalah energi dan efisiensi biaya juga akan menjadi pertimbangan yang penting. Berdasarkan studi literatur yang telah dilakukan, artikel ini akan mengidentifikasi dan merumuskan empat kunci penting implementasi teknologi 5G. Kata kunci : implementasi 5G, massive MIMO, jaringan hybrid, mmWave, unified air interface [En] 5G standardization process is expected to be finished before October 2020. This standardization is essential for making 5G network commercial deployment. The 5G technology is forecasted to demand a transformation in the need for very high carrier frequencies with very extensive bandwidth, extreme density for devices and base stations, as well as large numbers of antennas. 5G will not be a distinct air interface based on Radio Access Technology as in former generation models. 5G is predicted to be immensely collaborative: the linkage of air interface and 5G spectrum together with existing wireless technologies (for example: LTE and WiFi) will provide services with universal high-rates coverage and ensure seamless user experience. To support this, the core network must also evolve to achieve an extraordinary level of adjustability and intelligence, spectral standardization needs to be reviewed and revised, energy issues and cost efficiency will also be an important attention. Based on studies that had been done, this article will discuss and identify the four significant keys to the implementation of 5G technology.


Cryptography ◽  
2021 ◽  
Vol 5 (4) ◽  
pp. 35
Author(s):  
Suvidha K. S. ◽  
Jothi Rangasamy ◽  
Shyam S. Kamath ◽  
Cheng-Chi Lee

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack, man-in-the-middle attack, password-guessing attack and stolen-smart-card attack. In addition to these attacks, the scheme should achieve user anonymity, unlinkability and perfect forward secrecy. In the roaming scenario, as mobile users are connected to the foreign network, mobile users must provide authentication details to the foreign network to which they are connected. The foreign network forwards the authentication messages received from the mobile users to their home network. The home network validates the authenticity of the mobile user. In the roaming scenario, all communication between the three entities is carried over an insecure channel. It is assumed that the adversary has the capabilities to intercept the messages transmitted over an insecure channel. Hence, the authentication scheme designed must be able to resist the above-mentioned security attacks and achieve the security goals. Our proposed scheme ES-HAS (elliptic curve-based secure handover authentication scheme) is a two-factor authentication scheme in which the mobile user possesses the password, and the smart card resists the above-mentioned security attacks. It also achieves the above-mentioned security goals. We also extended our two-factor authentication to a multi-factor authentication scheme using the fingerprint biometric technique. The formal security analysis using BAN logic and the formal security verification of the proposed scheme using the widely accepted AVISPA (automated validation of internet security protocols and applications) tool is presented in this article. In comparison with the related schemes, the proposed scheme is more efficient and robust. This makes the proposed scheme suitable for practical implementation.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5501
Author(s):  
Kun Li ◽  
Xiaomeng Ai ◽  
Jiakun Fang ◽  
Bo Zhou ◽  
Lingling Le ◽  
...  

With the increasing amounts of terminal equipment with higher requirements of communication quality in the emerging fifth generation mobile communication network (5G), the energy consumption of 5G base stations (BSs) is increasing significantly, which not only raises the operating expenses of telecom operators but also imposes a burden on the environment. To solve this problem, a two-step energy management method that coordinates 5G macro BSs for 5G networks with user clustering is proposed. The coordination among the communication equipment and the standard equipment in 5G macro BSs is developed to reduce both the energy consumption and the electricity costs. A novel user clustering method is proposed together with Benders decomposition to accelerate the solving process. Simulation results show that the proposed method is computationally efficient and can ensure near-optimal performance, effectively reducing the energy consumption and electricity costs compared with the conventional dispatching scheme.


Sign in / Sign up

Export Citation Format

Share Document