论文标题

启用5G的移动通信中的小单元网络的隐私感知的安全区域移交

Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication

论文作者

Alnashwan, Rabiah, Gope, Prosanta, Dowling, Benjamin

论文摘要

5G移动通信网络提供了用户和服务提供商之间的无缝通信,并承诺要达到多个严格的要求,例如无缝的移动性和庞大的连接性。尽管5G可以提供许多好处,但仍然需要解决安全性和隐私问题。例如,将小单元网络(SCN)纳入5G,使网络更接近连接的用户,提供了更好的服务质量(QoS),从而大大增加了移交程序的数量(HO),这将影响网络的安全性,延迟和效率。然后,设计一个通过安全身份验证来支持无缝切换的方案至关重要,以避免SCN的后果。为了解决此问题,本文提出了一种具有用户匿名性的安全基于区域的切换方案,以及一种支持5G中SCN的无缝连接性的有效撤销机制。在这种情况下,我们介绍了三个隐私性身份验证协议,即初始身份验证协议,区域内切换协议和区域间切换协议,以处理三种通信方案。据我们所知,这是第一篇论文考虑5G通信中区域内和区域间切换方案中的隐私和安全性。提出了我们提出的方案的详细安全性和绩效分析,以表明它抵抗许多安全威胁,在计算方面具有成本效益,并为启用5G的移动通信提供了有效的解决方案。

The 5G mobile communication network provides seamless communications between users and service providers and promises to achieve several stringent requirements, such as seamless mobility and massive connectivity. Although 5G can offer numerous benefits, security and privacy issues still need to be addressed. For example, the inclusion of small cell networks (SCN) into 5G brings the network closer to the connected users, providing a better quality of services (QoS), resulting in a significant increase in the number of Handover procedures (HO), which will affect the security, latency and efficiency of the network. It is then crucial to design a scheme that supports seamless handovers through secure authentication to avoid the consequences of SCN. To address this issue, this article proposes a secure region-based handover scheme with user anonymity and an efficient revocation mechanism that supports seamless connectivity for SCNs in 5G. In this context, we introduce three privacy-preserving authentication protocols, i.e., initial authentication protocol, intra-region handover protocol and inter-region handover protocol, for dealing with three communication scenarios. To the best of our knowledge, this is the first paper to consider the privacy and security in both the intra-region and inter-region handover scenarios in 5G communication. Detailed security and performance analysis of our proposed scheme is presented to show that it is resilient against many security threats, is cost-effective in computation and provides an efficient solution for the 5G enabled mobile communication.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源