Privacy-Aware Secure Region-Based Handover for Small Cell Networks in 5G-Enabled Mobile Communication
نویسندگان
چکیده
The 5G mobile communication network provides seamless between users and service providers promises to achieve several stringent requirements, such as mobility massive connectivity. Although can offer numerous benefits, security privacy issues still need be addressed. For example, the inclusion of small cell networks (SCN) into brings closer connected users, providing a better quality services (QoS), resulting in significant increase number Handover procedures (HO), which will affect security, latency efficiency network. It is then crucial design scheme that supports handovers through secure authentication process. With this aim, article, we propose region-based handover connectivity for SCNs 5G. Our proposed based on asymmetric-key-based authenticated key exchange protocols preserve user while mechanism effective membership revocation management. In context, introduce three privacy-preserving protocols, i.e., an initial protocol, intra-region protocol inter-region dealing with scenarios. To best our knowledge, first paper consider both scenarios management support. Detailed performance analysis presented show it resilient against many threats, cost-effective efficient solution 5G-enabled communication.
منابع مشابه
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملPrivacy Aware Schemes in Mobile Adhoc Networks
A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. Both selfish and privacy issues have been identified as two crucial human factors for the wide acceptance of MANETs. Security has become a primary concern in order to provide protected communication between mobile nodes. In this work we present a rev...
متن کاملProactive Caching in 5G Small Cell Networks
Massive deployment of small-cell base stations (SBSs) is going to play a key role for capacity and coverage enhancements in 5G networks. However, the backhaul for these networks remains one of the important issue to solve. Ideally, the capacity of backhaul has to be in the same order of wireless links in order to avoid bottlenecks in the delivery and sustain huge traffic generated by mobile use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2023
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2023.3256703