A Secure and Effective Authentication Method in 5G

XinJian Li, ChengTao Wang, Xinhao Zou, Shijun Wang
{"title":"A Secure and Effective Authentication Method in 5G","authors":"XinJian Li, ChengTao Wang, Xinhao Zou, Shijun Wang","doi":"10.1109/AINIT59027.2023.10212595","DOIUrl":null,"url":null,"abstract":"The 5th generation mobile networks (5G), as a key infrastructure in the digital society, are accelerating their standardization and commercialization processes globally. At the same time, 5G network security issues have also attracted unprecedented attention. The 5G network adopts a more open network architecture and a more flexible protocol system, and the openness and flexibility make the 5G network face new security challenges. Throughout the various security issues in mobile communication systems over time, protocol flaws have always been one of the most easily exploited vulnerabilities by attackers. Therefore, this article proposes a secure and effective protocol in 5G. The proposed scheme can resist multiple common attacks and provide perfect forward confidentiality. The security and performance analysis of the scheme shows that the protocol has good execution efficiency while ensuring the authentication process and subsequent communication security, which can balance efficiency and security.","PeriodicalId":276778,"journal":{"name":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINIT59027.2023.10212595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The 5th generation mobile networks (5G), as a key infrastructure in the digital society, are accelerating their standardization and commercialization processes globally. At the same time, 5G network security issues have also attracted unprecedented attention. The 5G network adopts a more open network architecture and a more flexible protocol system, and the openness and flexibility make the 5G network face new security challenges. Throughout the various security issues in mobile communication systems over time, protocol flaws have always been one of the most easily exploited vulnerabilities by attackers. Therefore, this article proposes a secure and effective protocol in 5G. The proposed scheme can resist multiple common attacks and provide perfect forward confidentiality. The security and performance analysis of the scheme shows that the protocol has good execution efficiency while ensuring the authentication process and subsequent communication security, which can balance efficiency and security.
一种安全有效的5G认证方法
第5代移动通信网络(5G)作为数字社会的关键基础设施,正在全球范围内加速标准化和商用化进程。与此同时,5G网络安全问题也引起了前所未有的关注。5G网络采用更加开放的网络架构和更加灵活的协议体系,开放性和灵活性使5G网络面临新的安全挑战。纵观移动通信系统的各种安全问题,协议缺陷一直是攻击者最容易利用的漏洞之一。因此,本文提出了一种安全有效的5G协议。该方案能够抵御多种常见攻击,并提供完善的前向机密性。对方案的安全性和性能分析表明,该协议在保证认证过程和后续通信安全的同时,具有良好的执行效率,实现了效率和安全性的平衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信