scholarly journals 5G mobile networks based on SDN concepts

2018 ◽  
Vol 7 (4) ◽  
pp. 2231 ◽  
Author(s):  
Magri Hicham ◽  
Noureddine Abghour ◽  
Mohammed Ouzzif

With The rapid growth of mobile networks data and the emergence of the new services and applications, Mobile operators should provide a several solutions to cope with the challenges of the next 5G mobile networks and to reduce costs. For these reasons, SDN was proposed to be one of the key technology trends that will facilitate the required architectural agility needed in the next 5G mobile networks.Software Defined Networking (SDN) is the highly promising technology to provide innovation and enforce the main drivers in 5G mobile networks such as flexibility, suability, service–oriented management and to reduce costs by the softwarization of the 5G Core networks functions.Thus, there is an immediate need to study the fundamental architectural principles of SDN, and to analyze the integration and application scenarios of this architecture into the next 5G mobile networks. In this paper, we present a survey on the most relevant research works on SDN concepts and SDN integration in mobile networks. We propose a SDN-based architecture for 5G mobile network; we give an over-view of SDN requirements and challenges for SDN integration in 5G, we address the benefits of IPv6 over SDN in 5G and finally we provide the benefits of SDN integration in 5G mobile networks. 

This paper presents a comprehensive solution for secret key generation and user authentication for 5G mobile networks. Our solution exploits the integration between physical layer and cryptographic security primitives. The presented secure secret key generation and authentication protocol based on exploiting physical layer attributes Angle of Arrival (AoA) and merges between cryptography and non-cryptography techniques (physical layer security) to obtain secure and fast handover in 5G mobile network. Huge increasing of the exchanging data and the lack of the current usable spectrum (several hundred megahertz and a few gigahertz) led to the adoption of millimeter wave (mmWave) 5G mobile networks. The opportunity of the un usable spectrum in the millimeter wave (mmwave) range from 30~300 GHz mandates the utility of small cells with base stations (BS) equipped with large numbers of antennas massive Multiple Input Multiple Output (MIMO). This new architecture achieves better spectral and energy efficiencies, meanwhile, it also brings new challenges in security provisioning and new stringent latency requirements and potential risk of some security attacks. Impersonation and man-in-the-middle (MitM) attacks are examples of security vulnerabilities originated from the probable recurrent handovers and authentication processes in small cells architecture and Heterogeneous Networks (HetNets). The assessment and simulation for the proposed protocol has been proved using AVISPA tool against (MitM) attack and MATLAB tool against impersonation attack. The proposed protocol has the ability to mitigate these attacks with no extra communications overhead, yet, with tolerable delay of estimation process.


2020 ◽  
Vol 7 (1) ◽  
pp. 23-29
Author(s):  
Hiten Choudhury ◽  

Mobile networks are becoming a preferred choice for the Internet of Things (IoT), due to its flexibility, broad coverage, increasing bandwidth, low latency and low subscription cost. However, a long-standing security issue in any mobile network across the various generations is identity confidentiality. In a recent technical specification standardised by 3rd Generation Partnership Project (3GPP) for 5G mobile network, a novel scheme called the Elliptic Curve Integrated Encryption Scheme (ECIES) is adopted to tackle the issue of identity confidentiality. While this mechanism seems to provide a reasonable solution for modern resource affluent smart phones, it’s suitability for resource constrained IoT devices needs to be analysed. In this paper, we study the computational overhead of the ECIES on IoT devices.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2017 ◽  
Vol 25 (0) ◽  
pp. 153-163 ◽  
Author(s):  
Akihiro Nakao ◽  
Ping Du ◽  
Yoshiaki Kiriha ◽  
Fabrizio Granelli ◽  
Anteneh Atumo Gebremariam ◽  
...  

2021 ◽  
Author(s):  
Nora A. Ali ◽  
Magdy El-Soudani ◽  
Hany M. ElSayed ◽  
Hebat-Allah M. Mourad ◽  
Hassanein H. Amer

Sign in / Sign up

Export Citation Format

Share Document