Cross-Layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint

Q3 Decision Sciences
Wei Ao;Jian Wei;Yindong Li;Xiaolong Zhang;Bin Yu;Kaiwen Hou
{"title":"Cross-Layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint","authors":"Wei Ao;Jian Wei;Yindong Li;Xiaolong Zhang;Bin Yu;Kaiwen Hou","doi":"10.13052/jicts2245-800X.1234","DOIUrl":null,"url":null,"abstract":"In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"311-336"},"PeriodicalIF":0.0000,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770617","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of ICT Standardization","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10770617/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 0

Abstract

In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.
结合 5G 融合信道指纹的跨层认证机制模型
在实际通信环境中,攻击者一旦成功窃取合法信道信息,就可以根据认证响应破解密钥信息,因此存在密钥泄露的安全风险。本文结合物理层信道特性和共享密钥,将其组合成联合密钥,设计了一种基于插值多项式的挑战应答物理层认证机制。然后,将该方法应用于 5G 网络的 "EAP-AKA "认证协议,提出了一种面向 5G 融合信道指纹的跨层认证机制。最后,利用采集到的高层认证挑战响应数据,在 MATLAB 中搭建了仿真环境,验证了方案的可行性和安全性。实验结果表明,该认证机制具有更好的认证性能和安全性能。与传统的高层认证机制相比,它在计算开销方面具有一定的优势,可以满足大规模物联网终端的 5G 应用场景。此外,它将物理层认证与高层认证相结合,实现了相互补充、相互促进,提升了认证的安全性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of ICT Standardization
Journal of ICT Standardization Computer Science-Information Systems
CiteScore
2.20
自引率
0.00%
发文量
18
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信