A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC

被引:1
作者
Ranaweera, Pasika [1 ]
Yadav, Awaneesh Kumar [2 ]
Liyanage, Madhusanka [1 ]
Jurcut, Anca Delia [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[2] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
基金
爱尔兰科学基金会;
关键词
Authentication; edge computing; federated identity verification; MEC; security framework; service migration; KEY EXCHANGE; SECURITY;
D O I
10.1109/TDSC.2023.3320647
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing paradigms were an expedient innovation for elevating the contemporary standards of mobile and Internet networks. As specified in Multi-Access Edge Computing (MEC) standardization, edge computing serviceable infrastructures are running on virtualization technologies to provide dynamic and flexible service instances. Since the inception and operation of the services are executing at the edge level gNodeBs (gN Bs), migration of services between gN Bs is an imminent occurrence in edge computing that is contriving challenges to its feasible deployment. Security and service level latency requirements are vital parameters for such service migration operations conducted through gN B to gN B (g2g) connecting channels. In this paper, our focus is to ensure identity verification among the parties involved in a service migration through authentication and to secure the migrating content through a robust g2g channel establishment. Our proposed authentication protocol was designed in accordance with the MEC architectural standardization. We have verified the proposed protocol employing four different formal verification techniques: Scyther and AVISPA verification tools, GNY and ROR logical approaches. Further, we have developed the proposed protocol in a test-bed environment emulating the MEC system with an integrated 5G Core network.
引用
收藏
页码:2930 / 2948
页数:19
相关论文
共 39 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] [Anonymous], 2016, Int. J. Netw. Secur., V18, P769
  • [3] [Anonymous], 2021, TS 23. 501
  • [4] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [5] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [6] ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare
    Braeken, An
    Porambage, Pawani
    Puvaneswaran, Amirthan
    Liyanage, Madhusanka
    [J]. PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 47 - 53
  • [7] A Handover Authentication Using Credentials Based on Chameleon Hashing
    Choi, Jaeduck
    Jung, Souhwan
    [J]. IEEE COMMUNICATIONS LETTERS, 2010, 14 (01) : 54 - 56
  • [8] Cremers C.J.F., 2006, Scyther: Semantics and Verification of Security Protocols
  • [9] A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing
    Cui, Mengmeng
    Zhang, Haochen
    Huang, Yong
    Xu, Zhanyang
    Zhao, Qingzhan
    [J]. WIRELESS NETWORKS, 2024, 30 (05) : 3643 - 3656
  • [10] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208