Sec-E2E: End-to-End Communication Security in LS-HetNets Based on Blockchain

被引:1
作者
Fei, Shufan [1 ]
Yan, Zheng [1 ]
Xie, Haomeng [1 ]
Liu, Guocang [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710126, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 01期
基金
中国国家自然科学基金;
关键词
Security; Blockchains; Authentication; Protocols; Privacy; Device-to-device communication; 6G mobile communication; E2E security; blockchain; TEE; heterogeneous networks; privacy preservation; AUTHENTICATION; 5G; NETWORKS; PRIVACY; TRUST; VERIFICATION; PROTOCOL; SCHEME;
D O I
10.1109/TNSE.2023.3307884
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Large-Scale Heterogeneous Networks (LS-HetNets) integrate different types of networks enabled by various technologies into a global coverage network to offer seamless networking. Securing End-to-End (E2E) communication in LS-HetNets is an effective way to gain high communication security and user trust across multiple network domains. However, most of existing research on E2E security suffers from several severe drawbacks, such as single point of failures, identity privacy leakage, and poor generality. The literature still lacks a universal E2E communication security framework for LS-HetNets. In this paper, we propose Sec-E2E, a decentralized framework that uses blockchain to provide E2E communication security in LS-HetNets. It comprises several components that work in harmony to ensure secure and efficient E2E communications. Sec-E2E includes a blockchain-enabled protocol for User Equipment (UE) registration and key management, a privacy-preserving mutual authentication protocol that allows Serving Networks (SNs) and UEs to authenticate with each other quickly, and a secure session key generation and distribution scheme empowered with a Trusted Execution Environment (TEE). Security and performance evaluation demonstrates that Sec-E2E not only meets desired design goals of security and privacy, but also performs with higher efficiency compared with existing representative works.
引用
收藏
页码:761 / 778
页数:18
相关论文
共 56 条
[1]  
3GPP, 2015, 3GPP TS 33.310
[2]  
3rd Generation Partnership Project (3GPP), 2020, Technical Specification Group Services and System Aspects
[3]  
Security architecture and procedures for 5G system (Release 15)
[4]   Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler [J].
Abdelwahab, Sherif ;
Hamdaoui, Bechir ;
Guizani, Mohsen ;
Rayes, Ammar .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03) :276-288
[5]  
[Anonymous], 2018, 3GPP TS 33.501
[6]  
Barker E., 2018, Recommendation for Pair-Wise-Key Establishment Schemes Using Discrete Logarithm Cryptography, DOI [10.6028/NIST.SP.800-56Ar3, DOI 10.6028/NIST.SP.800-56AR3]
[7]  
BONEH D., 2001, Lecture Notes Comput. Sci., V2248, P514, DOI [10.1007/3-540-45682-130, DOI 10.1007/3-540-45682-130]
[8]   Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III [J].
Borntrager, C. ;
Bradbury, J. D. ;
Bundgen, R. ;
Busaba, F. ;
Heller, L. C. ;
Mihajlovski, V .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2020, 64 (5-6) :5-6
[9]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[10]   Blockchain for 5G: Opportunities and Challenges [J].
Chaer, Abdulla ;
Salah, Khaled ;
Lima, Claudio ;
Ray, Partha Pratim ;
Sheltami, Tarek .
2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,