Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol

被引:0
作者
Moatemri, Maroua [1 ,2 ]
Eltaief, Hamdi [1 ,2 ]
Youssef, Habib [1 ,2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] ISITC Hammam Sousse, PRINCE Lab, Sousse, Tunisia
来源
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024 | 2024年
关键词
SDMN; Multi-controller; East-west communication; 5G; Authentication; Hierarchical architecture; Security;
D O I
10.1109/IWCMC61514.2024.10592568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, mobility has become one of the most important aspects of all networks, including multi-controller SDMNs. Once authenticated, mobile users must be able to move freely between domains without losing access to the provided network services. To this aim, once authenticated, mobile users must be able to re-authenticate every time they move from their original domains. In this study, we present a novel 5G access authentication protocol designed specifically for multi-controller SDMN environments. The paper elaborates on the initial authentication procedure as well as the re-authentication process inherent to this protocol. In our proposed protocol the mobile user will not need to reach the authentication server for the re-authentication process. It provides the controller with its MSK token allowing him to approve the re-authentication request if the MSK token is valid. This will generate low latency improvement in terms of handover time. A comprehensive analysis is conducted to assess the robustness of the proposed authentication mechanism against diverse cyber attacks. Furthermore, an analytical equation for quantifying the communication costs involved in both the initial authentication and subsequent re-authentication processes is provided. In addition, to validate the security robustness of the proposed 5G access authentication protocol, we utilize the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.
引用
收藏
页码:993 / 998
页数:6
相关论文
共 16 条
  • [1] 3GPP B., 2020, Technical Specification (TS) 3GPP TS 33.501 V17. 0.0
  • [2] Arkko J., 2009, Improved extensible authentication protocol method for 3rd generation authentication and key agreement (eap-aka') (No. rfc5448
  • [3] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [4] A Formal Analysis of 5G Authentication
    Basin, David
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    Stettler, Vincent
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1383 - 1396
  • [5] Software-Defined Mobile Networks Security
    Chen, Min
    Qian, Yongfeng
    Mao, Shiwen
    Tang, Wan
    Yang, Ximin
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05) : 729 - 743
  • [6] Chevalier Y., 2004, WORKSH SPEC AUT PROC, P13
  • [7] Foundation O.N., Software-defined networking (sdn) definition
  • [8] Hoang D B., 2017, Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications, P3, DOI 10.1007/978-3-319-64653-4_1
  • [9] Multi-controller Based Software-Defined Net working : A Survey
    Hu, Tao
    Guo, Zehua
    Yi, Peng
    Baker, Thar
    Lan, Julong
    [J]. IEEE ACCESS, 2018, 6 : 15980 - 15996
  • [10] Inside I., 2019, A comparative introduction to 4g and 5g authentication