FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks

被引:13
作者
Yang, Yuanyuan [1 ]
Cao, Jin [1 ]
Ma, Ruhui [1 ]
Cheng, Lifu [2 ,3 ]
Chen, Lilan [1 ]
Niu, Ben [4 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Tsinghua Univ, Sch Integrated Circuits, Beijing 100084, Peoples R China
[3] Shanghai Aerosp Elect Technol Inst, Intelligent Architecture Dept, Shanghai 201109, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100864, Peoples R China
基金
中国国家自然科学基金;
关键词
Handover authentication; high-speed mobile terminals; satellite-terrestrial-integrated networks (STNs); SCHEME; ALLOCATION; RELAYS; SECURE; ACCESS; 3GPP; MTC;
D O I
10.1109/JIOT.2023.3262933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of satellite and terrestrial networks presents new opportunities and challenges for high speed rail (HSR) communications. Since the HSR runs vary fast, user terminals on the HSR have to perform handover authentication when the HSR passes through different terrestrial base stations or satellite coverage areas. To improve the security and robustness of HSR communication services, a fast handover authentication protocol (FHAP) for high-speed mobile terminals in the 5G satellite-terrestrial-integrated networks (STNs) is proposed. In the FHAP, user terminals in the same carriage form a temporary group managed by a relay node. The prehandover authentication mechanism is employed, in which the terrestrial 5G core network configures the preauthentication information to multiple access nodes based on the Chinese Remainder Theorem according to the location information of the HSR. Thus, group members and one of the access nodes can achieve fast handover authentication with the preconfigured information. Considering that HSR has a high running speed, when handover authentication fails, user terminals can perform handover authentication with other access nodes, and the probability of handover authentication failure caused by a single access node can be effectively reduced. We use the protocol verification tool Scyther and the Burrows-Abadi-Needham (BAN) logic to prove the security of the FHAP and compare it with other similar protocols in terms of signaling, bandwidth, and computational overhead. The analysis results show that the FHAP satisfies better security properties and has excellent performance.
引用
收藏
页码:13959 / 13973
页数:15
相关论文
共 50 条
[1]   Secure Transmission in Cognitive Satellite Terrestrial Networks [J].
An, Kang ;
Lin, Min ;
Ouyang, Jian ;
Zhu, Wei-Ping .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (11) :3025-3037
[2]  
[Anonymous], 2022, 3GPP TS 33.501
[3]  
[Anonymous], 2022, OPENSSL
[4]  
[Anonymous], 2020, DIGITAL SIGNATURE ST
[5]  
Barker E., 2020, 80057 NIST SP 1
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]   Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network [J].
Cao, Jin ;
Yu, Pu ;
Ma, Maode ;
Gao, Weifeng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1561-1575
[8]   EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Fu, Yulong ;
Liu, Xuefeng .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 102 :1-16
[9]   G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) :9689-9701
[10]  
Cao J, 2015, IEEE ICC, P7246, DOI 10.1109/ICC.2015.7249483