{"title":"5G Enabled Universal Seamless HO Authentication in Heterogeneous Networks","authors":"Puneet Kalia, Abhishek Kumar","doi":"10.1109/ICATIECE56365.2022.10047192","DOIUrl":null,"url":null,"abstract":"A new era in the evolution of wireless cellular operators has begun with the emergence of fifth-generation (5G) wireless networks. When 5G WSNs are implemented for industrial use, security is the top priority. Standards Release 16 from the Third Generation Partnership Project (3GPP) details the security features of 5G radio. Using the Cryptography method at neighbour base stations, gNodeBs (gNBs), we present a method for secure handoffs that is both safe and efficient. The legislation's safety is explicitly analysed to show that it can withstand a variety of harmful assaults. Through NS3 simulations, we examine how well the suggested strategy works in practice, taking into account both the time delays and the energy requirements. These findings validate our scheme's safety, effectiveness, and efficiency while demonstrating its suitability for use with equipment in fast motion, where power usage is a major concern.","PeriodicalId":199942,"journal":{"name":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATIECE56365.2022.10047192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A new era in the evolution of wireless cellular operators has begun with the emergence of fifth-generation (5G) wireless networks. When 5G WSNs are implemented for industrial use, security is the top priority. Standards Release 16 from the Third Generation Partnership Project (3GPP) details the security features of 5G radio. Using the Cryptography method at neighbour base stations, gNodeBs (gNBs), we present a method for secure handoffs that is both safe and efficient. The legislation's safety is explicitly analysed to show that it can withstand a variety of harmful assaults. Through NS3 simulations, we examine how well the suggested strategy works in practice, taking into account both the time delays and the energy requirements. These findings validate our scheme's safety, effectiveness, and efficiency while demonstrating its suitability for use with equipment in fast motion, where power usage is a major concern.