Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets
نویسندگان
چکیده
Creating a secure environment for communications is becoming a significantly challenging task in 5G Heterogeneous Networks (HetNets) given the stringent latency and high capacity requirements of 5G networks. This is particularly factual knowing that the infrastructure tends to be highly diversified especially with the continuous deployment of small cells. In fact, frequent handovers in these cells introduce unnecessarily recurring authentications leading to increased latency. In this paper, we propose a software-defined wireless network (SDWN)-enabled fast cross-authentication scheme which combines non-cryptographic and cryptographic algorithms to address the challenges of latency and weak security. Initially, the received radio signal strength vectors at the mobile terminal (MT) is used as a fingerprinting source to generate an unpredictable secret key. Subsequently, a cryptographic mechanism based upon the authentication and key agreement protocol by employing the generated secret key is performed in order to improve the confidentiality and integrity of the authentication handover. Further, we propose a radio trusted zone database aiming to enhance the frequent authentication of radio devices which are present in the network. In order to reduce recurring authentications, a given covered area is divided into trusted zones where each zone contains more than one small cell, thus permitting the MT to initiate a single authentication request per zone, even if it keeps roaming between different cells. Accordingly, once the RSS vectors and the encrypted mobile identification are received by the authentication slice (AS), this latter builds the authentication vector using the k-nearest neighborhood technique to estimate the k fingerprint distribution which is compared to the radio trusted zones database to prove the legitimacy of the MT and the network slice (NS). Cross-layer authentication protocol is consequently executed. The proposed scheme is analyzed under different attack scenarios and its complexity is compared with cryptographic and non-cryptographic approaches to demonstrate its security resilience and computational efficiency.
منابع مشابه
Ultra-Dense HetNets Meet Big Data: Green Frameworks, Techniques, and Approaches
Ultra-dense heterogeneous networks (Ud-HetNets) have been put forward to improve the network capacity for nextgeneration wireless networks. However, counter to the 5G vision, ultra-dense deployment of networks would significantly increase energy consumption and thus decrease network energy efficiency suffering from the conventional worst-case network design philosophy. This problem becomes part...
متن کاملInterference Mitigation Approach towards 5 G network
In the recent years, the demand for higher data rates has been continuously growing to satisfy consumers’ desire for a faster, safer, and smarter wireless network. Since current wireless systems are facing a bottleneck in spectrum resources which make it difficult to enhance performance in the limited available bandwidth. To overcome this problem new Generation of mobile communication known as ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملEfficient and Secure Authentication Handover using Network functions virtualization
Mobility of the subscriber is an important attribute to the success of a telecommunication network. With the advent of 5G networking which achieves high throughput rates by using heterogeneous nodes and frequent handovers, existing authentication and handover techniques should be revisited to securely and reliably perform handovers for LTE LTE. By virtualizing the nodes through Network Function...
متن کاملA Comparison Study of Coupled and Decoupled Uplink Heterogeneous Cellular Networks
The evolution of mobile cellular networks has brought great changes of network architecture. For example, heterogeneous cellular network (HetNet) and Ultra dense network (UDN) have been proposed as promising techniques for 5G systems. Dense deployment of base stations (BSs) allows a mobile user to be able to access multiple BSs. Meanwhile the unbalance between UL and DL in HetNets, such as diff...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1802.01719 شماره
صفحات -
تاریخ انتشار 2018