scholarly journals An efficient anonymous group handover authentication protocol for MTC devices for 5G networks

2022 ◽  
Vol 355 ◽  
pp. 03052
Author(s):  
Xiaobei Yan ◽  
Maode Ma

Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage of a new target base station simultaneously. However, the current handover mechanism specified by the Third Generation Partnership Project (3GPP) incur high signalling overhead over the access network and the core network for such scenario. Moreover, other existing solutions have several security problems in terms of failure of key forward secrecy (KFS) and lack of mutual authentication. In this paper, we propose an efficient authentication protocol for a group of MTCDs in all handover scenarios. By the proposal, the messages of two MTCDs are concatenated and sent by an authenticated group member to reduce the signalling cost. The proposed protocol has been analysed on its security functionality to show its ability to preserve user privacy and resist from major typical malicious attacks. It can be expected that the proposed scheme is applicable to all kinds of group mobility scenarios such as a platoon of vehicles or a high-speed train. The performance evaluation demonstrates that the proposed protocol is efficient in terms of computational and signalling cost.

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Jin Cao ◽  
Hui Li ◽  
Maode Ma ◽  
Fenghua Li

Machine Type Communication (MTC), as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN) for massive MTC (mMTC) devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A) networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP) require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC) techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK) model and verified based on the AVISPA and SPAN.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2022 ◽  
pp. 1-16
Author(s):  
Nagaraj Varatharaj ◽  
Sumithira Thulasimani Ramalingam

Most revolutionary applications extending far beyond smartphones and high configured mobile device use to the future generation wireless networks’ are high potential capabilities in recent days. One of the advanced wireless networks and mobile technology is 5G, where it provides high speed, better reliability, and amended capacity. 5 G offers complete coverage, which is accommodates any IoT device, connectivity, and intelligent edge algorithms. So that 5 G has a high demand in a wide range of commercial applications. Ambrosus is a commercial company that integrates block-chain security, IoT network, and supply chain management for medical and food enterprises. This paper proposed a novel framework that integrates 5 G technology, Machine Learning (ML) algorithms, and block-chain security. The main idea of this work is to incorporate the 5 G technology into Machine learning architectures for the Ambrosus application. 5 G technology provides continuous connection among the network user/nodes, where choosing the right user, base station, and the controller is obtained by using for ML architecture. The proposed framework comprises 5 G technology incorporate, a novel network orchestration, Radio Access Network, and a centralized distributor, and a radio unit layer. The radio unit layer is used for integrating all the components of the framework. The ML algorithm is evaluated the dynamic condition of the base station, like as IoT nodes, Ambrosus users, channels, and the route to enhance the efficiency of the communication. The performance of the proposed framework is evaluated in terms of prediction by simulating the model in MATLAB software. From the performance comparison, it is noticed that the proposed unified architecture obtained 98.6% of accuracy which is higher than the accuracy of the existing decision tree algorithm 97.1% .


Author(s):  
Chun-Chuan Yang ◽  
Jeng-Yueng Chen ◽  
Yi-Ting Mai ◽  
Yi-Chih Wang

LTE-Advanced (LTE-A) offloading is concerned about alleviating traffic congestion for the LTE-A network, which includes the core network and the radio access network (RAN). Due to the scarcity of the radio resource, offloading for the LTE-A RAN is more critical, for which an efficient way is to integrate Wi-Fi with LTE-A to form a heterogeneous RAN environment. An LTE-A UE (User Equipment) with the wi-fi interface can therefore access the Internet via an LTE-A base station of Evolved Node B (eNB) or a wi-fi Access Point (AP). In this paper, wireless network selection for UEs with delay-sensitive traffic in the heterogeneous RAN of LTE-A and wi-fi is addressed. Based on the queueing model of M/G/1, a novel network selection and offloading scheme, namely Delay-Sensitive Network Selection and Offloading (DSO), is proposed. The average system time at LTE-A eNBs and wi-fi APs calculated according to M/G/1 is used for network selection as well as offloading operations in DSO. The benefit of DSO in terms of satisfying the delay budget of UEs and load balancing is demonstrated by the simulation study.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1710
Author(s):  
Khizar Abbas ◽  
Muhammad Afaq ◽  
Talha Ahmed Khan ◽  
Adeel Rafiq ◽  
Wang-Cheol Song

The fifth-generation mobile network presents a wide range of services which have different requirements in terms of performance, bandwidth, reliability, and latency. The legacy networks are not capable to handle these diverse services with the same physical infrastructure. In this way, network virtualization presents a reliable solution named network slicing that supports service heterogeneity and provides differentiated resources to each service. Network slicing enables network operators to create multiple logical networks over a common physical infrastructure. In this research article, we have designed and implemented an intent-based network slicing system that can slice and manage the core network and radio access network (RAN) resources efficiently. It is an automated system, where users just need to provide higher-level network configurations in the form of intents/contracts for a network slice, and in return, our system deploys and configures the requested resources accordingly. Further, our system grants the automation of the network configurations process and reduces the manual effort. It has an intent-based networking (IBN) tool which can control, manage, and monitor the network slice resources properly. Moreover, a deep learning model, the generative adversarial neural network (GAN), has been used for the management of network resources. Several tests have been carried out with our system by creating three slices, which shows better performance in terms of bandwidth and latency.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Yongbin Zeng ◽  
Hui Guang ◽  
Guangsong Li

Mobile wireless networks are widely used in our daily lives. Seamless handover occurs frequently and how to guarantee security and efficiency during handover procedure is a major challenge. A handover authentication protocol with nice properties can achieve goals. Protocols proposed in recent years more or less have some security vulnerability. In this paper, we outline security requirements for handover authentication protocols and then propose an anonymous protocol based on a new attribute-based signature scheme. The proposed protocol realizes conditional privacy preserving, user revocation, and session key update as well as mutual authentication and anonymity. Besides, it achieves fine-grained access control due to attributes representing real identity. What is more, experiment shows the proposed protocol has a superior performance.


2019 ◽  
Vol 9 (6) ◽  
pp. 4996-5000
Author(s):  
A. Y. Al-Zahrani

A cellular communication system is divided into two main parts, core network, and radio access network. This research is concerned with the radio access network part which consists of multiple-cells, each served by a central located base station. Furthermore, the users in each cell are considered to be uniformly distributed inside the cell. In the downlink context, the users’ packets usually arrive at the base station via fiber optic and then are relayed to the users via radio waves of certain frequency/ies. The speeds of delivering users’ packets vary, depending on the users’ location. In this paper, the actual distribution of the service time over different users whose locations are uniformly distributed in a cell served by one base station is analytically found. Simulation results are presented to validate the derived model.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Jinxia Yu ◽  
Shangya Han ◽  
Qing Ye ◽  
Panke Qin ◽  
Yongli Tang ◽  
...  

AbstractAn important problem of network traffic is how to efficiently carry massive amounts of data traffic generated by Peer-to-Peer (P2P) services in high-speed and large-capacity optical access networks. P2P file-sharing traffic is regarded as one of the biggest bandwidth consumption in the world. Internet service providers can reduce the bandwidth burden in the feeder fiber by localizing the network traffic. In this paper, we propose an enhanced redirection strategy based on the optimized MPCP protocol (ERS-MPCP) to redirect the traffic into the access network and reduce the latency. A Markov chain is used for mathematical modeling. In the proposed strategy, we build a simulation platform for network simulation. Simulation results show that our strategy can improve the overall redirection success rate by up to 9%, thereby reducing the data traffic burden on the core network.


Sign in / Sign up

Export Citation Format

Share Document