Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover

被引:0
作者
Bi, Ye [1 ]
Jia, Chunfu [1 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin Key Lab Network & Data Secur Technol & DIS, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Authentication; Handover; 5G mobile communication; Security; Protocols; Base stations; Computer architecture; Privacy; Vehicle-to-everything; Standards; 5G V2N; multi-server; handover authentication protocol; keys forward/backward secrecy; privacy-preserving; KEY AGREEMENT SCHEME; TO-MANY AUTHENTICATION; SECURE; LIGHTWEIGHT; INTERNET;
D O I
10.1109/TMC.2025.3532120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The booming 5G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and densification of 5G raise new security and efficiency challenges. The existing secondary authentication fails to support multi-service access. The random access process lacks authentication of the gNB, possibly leading to fake base station attacks (FBS). Moreover, related research extends key forward/backward secrecy (KF/BS) to require that it also applies to gNBs, thus invalidating most existing schemes. This paper introduces a comprehensive security framework for 5G-V2N that seamlessly integrates with existing standardized architecture to provide privacy-preserving mutual authentication and key agreement for the full service cycle. Specifically, we propose new secondary authentication involving gNBs and support single request access to multi-services. Second, incorporating the service migration idea, we design the g2g (gNB-to-gNB) channel establishment phase to promote secure context share. Finally, the proposed efficient handover phase achieves the security properties of enhanced KF/BS, known randomness secrecy and privacy-preserving, and avoids FBS. We verify the proposed protocol using three different formal techniques: provably secure, BAN-logic, and AVISPA tool. Extensive experimental results and comparison show that our scheme excels in computational and communication efficiencies, and detecting malicious events.
引用
收藏
页码:5446 / 5463
页数:18
相关论文
共 48 条
[1]   Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator [J].
Alnashwan, Rabiah ;
Yang, Yang ;
Dong, Yilu ;
Gope, Prosanta ;
Abdolmaleki, Behzad ;
Hussain, Syed Rafiul .
PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, :2057-2071
[2]   Privacy-Aware Secure Region-Based Handover for Small Cell Networks in 5G-Enabled Mobile Communication [J].
Alnashwan, Rabiah ;
Gope, Prosanta ;
Dowling, Benjamin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :1898-1913
[3]  
[Anonymous], 2019, T. 3GPP TS 33.501
[4]   A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones [J].
Bhattarai, Image ;
Pu, Cong ;
Choo, Kim-Kwang Raymond ;
Korac, Dragan .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11) :19790-19803
[5]   CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets [J].
Cao, Jin ;
Ma, Maode ;
Fu, Yulong ;
Li, Hui ;
Zhang, Yinghui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1182-1195
[6]   End-to-End V2X Latency Modeling and Analysis in 5G Networks [J].
Coll-Perales, Baldomero ;
Lucas-Estan, M. Carmen ;
Shimizu, Takayuki ;
Gozalvez, Javier ;
Higuchi, Takamasa ;
Avedisov, Sergei ;
Altintas, Onur ;
Sepulcre, Miguel .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (04) :5094-5109
[7]   Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment [J].
Cui, Jie ;
Zhang, Xiaoyu ;
Zhong, Hong ;
Zhang, Jing ;
Liu, Lu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1654-1667
[8]   B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs [J].
Dwivedi, Sanjeev Kumar ;
Amin, Ruhul ;
Vollala, Satyanarayana ;
Khan, Muhammad Khurram .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06) :3491-3504
[9]   A Tutorial on 5G NR V2X Communications [J].
Garcia, Mario H. Castaneda ;
Molina-Galan, Alejandro ;
Boban, Mate ;
Gozalvez, Javier ;
Coll-Perales, Baldomero ;
Sahin, Taylan ;
Kousaridas, Apostolos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03) :1972-2026
[10]   Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones [J].
Gasti, Paolo ;
Sedenka, Jaroslav ;
Yang, Qing ;
Zhou, Gang ;
Balagani, Kiran S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2556-2571