SKAP-NS: A Symmetric Key-Based Authentication Protocol for 5G Network Slicing

被引:0
作者
Yadav, Awaneesh Kumar [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin D04 C1P1, Ireland
关键词
Authentication; Protocols; 5G mobile communication; Security; Network slicing; Costs; Encryption; 5G; authentication; authentication protocols; IoT; network slicing; SECURE; EFFICIENT; EXCHANGE; SCHEME;
D O I
10.1109/TII.2024.3435535
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network slicing is a pivotal technology in upcoming telecommunications. It enables the segmentation of the physical network into multiple tailored logical networks. These networks serve diverse purposes, facilitating users swift access to a range of services. The 5G mobile network leverages network slicing to accommodate various consumer applications. Nevertheless, security concerns, particularly regarding authentication, pose a significant challenge in network slicing. Various asymmetric encryption-based authentication protocols are designed to protect network-slicing communication. The state-of-the-art shows that these solutions are either expensive or vulnerable. They face severe attacks, including privacy issues, traceability, and ephemeral secret leakage. They also do not offer the perfect forward secrecy. Most of the existing protocols are based on asymmetric encryption. Therefore, considering the above-mentioned, a symmetric encryption-based authentication protocol is designed to tackle the problem of cost and security. The security of the designed protocol is verified using both informal and formal methods. These include real-or-random logic and the Scyther validation tool. This ensures that the proposed protocol offers robust security. Moreover, a comparative analysis is conducted to demonstrate the effectiveness of the proposed protocol. This analysis evaluates computational, communication, storage, and energy consumption costs, comparing the protocol to its competitors.
引用
收藏
页码:13363 / 13372
页数:10
相关论文
共 39 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment
    Abdulqadder, Ihsan H.
    Zhou, Shijie
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 18079 - 18097
  • [3] [Anonymous], 2017, SECURITY CHALLENGES
  • [4] [Anonymous], 2021, NETWORK SLICING MARK
  • [5] [Anonymous], 2009, Post-quantum cryptography, DOI [DOI 10.1007/978-3-540-88702-71, DOI 10.1007/978-3-540-88702-7]
  • [6] Barker E., 2009, NIST SPECIAL PUBLICA, V800
  • [7] Behrad S, 2019, PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), P281, DOI [10.1109/NETSOFT.2019.8806667, 10.1109/netsoft.2019.8806667]
  • [8] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [9] LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    Cao, Jin
    Yan, Zheng
    Ma, Ruhui
    Zhang, Yinghui
    Fu, Yulong
    Li, Hui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5329 - 5344
  • [10] Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC
    Cao, Liling
    Liang, Mei
    Zhang, Zheng
    Cao, Shouqi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022