Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks

نویسندگان

چکیده

5G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, comparison to 4G networks, they are also coming close standardization. For example, has a new level transfer processing speed that assures users not disconnected when move from one cell another; thus, supporting faster connection. However, it comes with its own technical challenges relating resource management, authentication handover user privacy protection. In 5G, the frequent displacement among cells as result repeated handovers often lead delay, contradicting objectives. this paper, we propose approach utilizes blockchain software defined networking (SDN) techniques remove re-authentication heterogeneous cells. The proposed is designed assure low appropriate for network which can be replaced least delay using their public private keys provided by devised component while protecting privacy. our between Proof-of-Work (POW)-based network-based models, was shown less than 1ms. Also, demonstrated signaling overhead energy consumption compared peer models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Blockchain Enabled Privacy Audit Logs

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...

متن کامل

Efficient User Authentication and Key Agreement with User Privacy Protection

Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...

متن کامل

A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communicati...

متن کامل

Privacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks

Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...

متن کامل

SDN for 5G Mobile Networks: NORMA Perspective

To build a flexible and an adaptable architecture network supporting variety of services and their respective requirements, 5G NORMA introduced a network of functions based architecture breaking the major design principles followed in the current network of entities based architecture. This revolution exploits the advantages of the new technologies like Software-Defined Networking (SDN) and Net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Network Science and Engineering

سال: 2021

ISSN: ['2334-329X', '2327-4697']

DOI: https://doi.org/10.1109/tnse.2019.2937481