A secure and efficient handover authentication and key management protocol for 5G networks

被引:9
作者
Huang J.Q. [1 ]
Qian Y. [1 ]
机构
[1] Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, 1110 S 67th Street, Omaha, 68182, NE
关键词
5G wireless network; Handover authentication; Key management; Security;
D O I
10.23919/jcin.2020.9055109
中图分类号
学科分类号
摘要
As a major component of the fifth-generation (5G) wireless networks, network densification greatly increases the network capacity by adding more cell sites into the network. However, the densified network increases the handover frequency of fast-moving mobile users, like vehicles. Thus, seamless handover with security provision is highly desirable in 5G networks. The third generation partnership project (3GPP) has been working on standardization of the handover procedure in 5G networks to meet the stringent efficiency and security requirement. However, the existing handover authentication process in 5G networks has security flaws, i.e. vulnerable to replay and de-synchronization attacks, and cannot provide perfect forward secrecy. In this paper, we propose a secure and efficient handover authentication and key management protocol utilizing the Chinese remainder theory. The proposed scheme preserves the majority part of the original 5G system architecture defined by 3GPP, thus can be easily implemented in practice. Formal security analysis based on BAN-logic shows that the proposed scheme achieves secure mutual authentication and can remedy some security flaws in original 5G handover process. Performance analysis shows that the proposed protocol has lower communication overhead and computation overhead compared with other handover authentication schemes. © 2020, Posts and Telecom Press Co Ltd. All rights reserved.
引用
收藏
页码:40 / 49
页数:9
相关论文
共 20 条
[1]  
CAO J, MA M, LI H, Et al., A survey on security aspects for 3GPP 5G networks, IEEE Communications Surveys & Tutorials
[2]  
HUANG J, QIAN Y, HU Q Y., A vehicle-assisted data offloading in mobile edge computing enabled vehicular networks, IEEE GLOBECOM, pp. 1-6, (2019)
[3]  
WANG C, ZHANG Y, CHEN X, Et al., SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems, IEEE Internet of Things Journal, 6, 5, pp. 8692-8701, (2019)
[4]  
MUHAMMED M, SAFDAR G A., Survey on existing authentication issues for cellular-assisted V2X communication, Vehicular Communications, 12, pp. 50-65, (2018)
[5]  
3rd generation partnership project
[6]  
Technical specification group services and system aspects
[7]  
Security architecture and procedures for 5G system (Release 16), (2019)
[8]  
GUPTA S, PARNE B L, CHAUDHARI N S., Security vulnerabilities in handover authentication mechanism of 5G network, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 369-374, (2018)
[9]  
HAN C, CHOI H., Security analysis of handover key management in 4G LTE/SAE networks, IEEE Transactions on Mobile Computing, 13, 2, pp. 457-468, (2014)
[10]  
CHOI J, JUNG S., A handover authentication using credentials based on chameleon hashing, IEEE Communications Letters, 14, 1, pp. 54-56, (2010)