Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

被引:13
作者
Khan, Adnan Shahid [1 ]
Javed, Yasir [2 ]
Saqib, Rashad Mahmood [1 ,3 ]
Ahmad, Zeeshan [1 ,4 ]
Abdullah, Johari [1 ]
Zen, Kartinah [1 ]
Abbasi, Irshad Ahmed [1 ,5 ]
Khan, Nayeem Ahmad [6 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Malaysia
[2] Prince Sultan Univ, Dept Comp Sci, Riyadh 11586, Saudi Arabia
[3] King Abdulaziz Univ, Fac Appl Studies, Jeddah 21589, Saudi Arabia
[4] King Khalid Univ, Dept Elect Engn, Abha 62529, Saudi Arabia
[5] Univ Bisha, Fac Sci & Arts Belqarn, Dept Comp Sci, Sabt Al Alaya 61985, Saudi Arabia
[6] Al Baha Univ, Fac Comp Sci & Informat Technol, Al Baha 65731, Saudi Arabia
关键词
Security; Authentication; Device-to-device communication; Elliptic curve cryptography; Costs; Spread spectrum communication; Passwords; Multifactor authentication; LEMAP; D2D communication; 6G; BAN (BAN Logic); Elgamal; SECURITY; PROTOCOL; DEVICE; COMMUNICATION; INTERNET; PRIVACY;
D O I
10.1109/ACCESS.2022.3159686
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires each device to act as intelligent transmission relays. Inclusion of such intelligence relays and support of quantum computing at D2D may compromise existing security mechanisms and may lead towards primitive attacks such as impersonation attack, rouge device attack, replay attack, MITM attack, and DoS attack. Thus, an effective yet lightweight security scheme is required that can support existing low computation devices and can address the challenges that 5G/6G poses. This paper proposes a Lightweight ECC (elliptic curve cryptography)-based Multifactor Authentication Protocol (LEMAP) for miniaturized mobile devices. LEMAP is the extension of our previous published work TLwS (trust-based lightweight security scheme) which utilizes ECC with Elgamal for achieving lightweight security protocol, confidentiality, integrity, and non-repudiation. Multi-factor Authentication is based on OTP (Biometrics, random number), timestamp, challenge, and password. This scheme has mitigated the above-mentioned attacks with significantly lower computation cost, communication cost, and authentication overhead. We have proven the correctness of the scheme using widely accepted Burrows-Abadi-Needham (BAN) logic and analyzed the performance of the scheme by using a simulator. The security analysis of the scheme has been conducted using the Discrete Logarithm Problem to verify any quantum attack possibility. The proposed scheme works well for 5G/6G cellular networks for single and multihop scenarios.
引用
收藏
页码:31273 / 31288
页数:16
相关论文
共 47 条
[1]  
Abdullah J., 2017, J. Telecommun., Electron. Comput. Eng. (JTEC), V9, P99
[2]  
Adat V, 2018, IEEE GLOB COMM CONF
[3]   Blockchain in Internet-of-Things: Architecture, Applications and Research Directions [J].
Ahmad, Farhan ;
Ahmad, Zeeshan ;
Kerrache, Chaker Abdelaziz ;
Kurugollu, Fatih ;
Adnane, Asma ;
Barka, Ezedin .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :314-319
[4]   Anomaly Detection Using Deep Neural Network for IoT Architecture [J].
Ahmad, Zeeshan ;
Khan, Adnan Shahid ;
Nisar, Kashif ;
Haider, Iram ;
Hassan, Rosilah ;
Haque, Muhammad Reazul ;
Tarmizi, Seleviawati ;
Rodrigues, Joel J. P. C. .
APPLIED SCIENCES-BASEL, 2021, 11 (15)
[5]  
Aqeel Sehrish, 2022, EDPACS: The EDP Audit, Control, and Security Newsletter, P1, DOI 10.1080/07366981.2021.1958742
[6]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[7]  
Balan K, 2018, INT J ADV COMPUT SC, V9, P298
[8]   SDR Implementation of a D2D Security Cryptographic Mechanism [J].
Balan, Titus N. ;
Balan, Alexandra C. ;
Sandu, Florin D. .
IEEE ACCESS, 2019, 7 :38847-38855
[9]  
Bos J., 2009, IACR CRYPTOL EPRINT, V57, P1
[10]  
Boyd C., 1994, ADV CRYPTOLOGY EUROC, V765, DOI [10.1007/3-540-48285-7_20, DOI 10.1007/3-540-48285-7_20]