Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks
نویسندگان
چکیده
5G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, comparison to 4G networks, they are also coming close standardization. For example, has a new level transfer processing speed that assures users not disconnected when move from one cell another; thus, supporting faster connection. However, it comes with its own technical challenges relating resource management, authentication handover user privacy protection. In 5G, the frequent displacement among cells as result repeated handovers often lead delay, contradicting objectives. this paper, we propose approach utilizes blockchain software defined networking (SDN) techniques remove re-authentication heterogeneous cells. The proposed is designed assure low appropriate for network which can be replaced least delay using their public private keys provided by devised component while protecting privacy. our between Proof-of-Work (POW)-based network-based models, was shown less than 1ms. Also, demonstrated signaling overhead energy consumption compared peer models.
منابع مشابه
Blockchain Enabled Privacy Audit Logs
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...
متن کاملEfficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...
متن کاملA New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communicati...
متن کاملPrivacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks
Vehicular Ad hoc Networks (VANETs) authentication schemes need to consider mobility and rapidly changing topologies in addition to an unreliable wireless channel communication. IEEE 1609.2, VANET security standard, suggests Elliptic Curve Digital Signature Algorithm (ECDSA) for the authentication of Vehicleto-Vehicle (V2V) messages. However, it has the drawback of expensive computations for ver...
متن کاملSDN for 5G Mobile Networks: NORMA Perspective
To build a flexible and an adaptable architecture network supporting variety of services and their respective requirements, 5G NORMA introduced a network of functions based architecture breaking the major design principles followed in the current network of entities based architecture. This revolution exploits the advantages of the new technologies like Software-Defined Networking (SDN) and Net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Network Science and Engineering
سال: 2021
ISSN: ['2334-329X', '2327-4697']
DOI: https://doi.org/10.1109/tnse.2019.2937481