Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks

被引:2
作者
Krishnan, Prabhakar [1 ]
Jain, Kurunandan [1 ]
Alluhaidan, Ala-Saleh D. [2 ]
Prabu, P. [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Dept Cybersecur Syst & Networks, Amritapuri campus, Ettimadai, Kerala, India
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh, Saudi Arabia
[3] CHRIST, Dept Comp Sci, Bengaluru, Karnataka, India
关键词
5G; Wireless; Mobility management; Handoff; Handover authentication; SDN; NFV; Privacy-preserving; Vehicular communication; v2x; SMALL-CELL NETWORKS; INTERNET; ACCESS;
D O I
10.1016/j.compeleceng.2024.109152
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Fifth Generation (5 G) networks exhibit high flexibility and diversity in their design and deployment strategies. Transitions between base stations (BSs), heterogeneous networks (HetNets) and other cellular networks provide significant vulnerabilities and expose users to substantial risks associated with cybersecurity attacks. This article evaluates current handover authentication methods in the context of 5 G networks while proposing a set of security criteria for handover authentication. This study presents a novel authentication technique called SHK (Secure Handover Key) that utilizes SDNs (Software Defined networks). The proposed scheme integrates recycled lightweight dynamic key cryptography and combines security features such as perfect forward secrecy and robustness to leakages. The significance of the proposed approach is assessed in terms of computations, communications, signals, and energy costs on 5 G mobility applications and Vehicular Communication Networks (VCNs). The scheme employed in this study demonstrates enhanced security measures and improved changeover performance compared to conventional schemes.
引用
收藏
页数:24
相关论文
共 24 条
  • [1] Abbas AH, 2019, INT J ADV COMPUT SC, V10, P194
  • [2] SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach
    Abbas, Muhammad Tahir
    Muhammad, Afaq
    Song, Wang-Cheol
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1265 - 1280
  • [3] Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment
    Abdulqadder, Ihsan H.
    Zou, Deqing
    Aziz, Israa T.
    Yuan, Bin
    Dai, Weiqi
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 866 - 877
  • [4] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476
  • [5] CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets
    Cao, Jin
    Ma, Maode
    Fu, Yulong
    Li, Hui
    Zhang, Yinghui
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1182 - 1195
  • [6] UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks
    Cao, Jin
    Li, Hui
    Ma, Maode
    Li, Fenghua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [7] Design and implementation of integrated tactical mobility testbed
    Choi, Hongrok
    Seo, Sangwon
    Jung, Daeyoung
    Pack, Sangheon
    Kang, Minwook
    Chung, Yunwon
    Joo, Hyungjun
    Kang, Kyungran
    [J]. ICT EXPRESS, 2021, 7 (01): : 23 - 27
  • [8] ENHANCING VEHICULAR COMMUNICATION USING 5G-ENABLED SMART COLLABORATIVE NETWORKING
    Dong, Ping
    Zheng, Tao
    Yu, Shui
    Zhang, Hongke
    Yan, Xiaoyun
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (06) : 72 - 79
  • [9] ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications
    Fan, Chun-, I
    Huang, Jheng-Jia
    Zhong, Min-Zhe
    Hsu, Ruei-Hau
    Chen, Wen-Tsuen
    Lee, Jemin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 927 - 942
  • [10] 5G-V2X: standardization, architecture, use cases, network-slicing, and edge-computing
    Hakeem, Shimaa A. Abdel
    Hady, Anar A.
    Kim, HyungWon
    [J]. WIRELESS NETWORKS, 2020, 26 (08) : 6015 - 6041