Efficient handover protocol for 5G and beyond networks

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Vincent Omollo Nyangaresi , Anthony Joachim Rodrigues
{"title":"Efficient handover protocol for 5G and beyond networks","authors":"Vincent Omollo Nyangaresi ,&nbsp;Anthony Joachim Rodrigues","doi":"10.1016/j.cose.2021.102546","DOIUrl":null,"url":null,"abstract":"<div><p><span><span><span><span>The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as </span>vehicular communications, </span>internet of everything<span><span><span> (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and handover </span>authentications present some challenges. To facilitate seamless connectivity in 5G and B5G networks, numerous </span>machine learning schemes have been developed to facilitate target cell selection based on parameters such as signal strength and </span></span>signal to noise ratio<span> (SNR). However, most of these approaches concentrate on performance enhancements, ignoring security and privacy issues. On their part, majority of the conventional handover authentication schemes<span> exhibit long latencies which contravenes 5G and B5G requirements. Moreover, the base stations in these networks have very small footprints and hence require the deployment of numerous base stations within the coverage area. This serves to compound performance, security and privacy issues due to the resulting frequent handovers. In this paper, a multilayer neural network (MLNN) privacy and security preservation protocol is presented. To facilitate target cell selection, parameters that took user satisfaction, network, user equipment (UE) and service requirements into consideration were deployed so as to enhance both quality of service (QoS) and </span></span></span>quality of experience (QoE) during and after handover. For handover security, timestamps, ephemerals and random nonces were deployed during handover authentication to offer both security and privacy. Formal security analysis using Burrows-Abadi-Needham (BAN) showed that the proposed protocol offered strong mutual authentication among the communicating entities. On the other hand, informal security analysis showed that the proposed protocol offers perfect forward key secrecy and is robust against attacks such as impersonation and packet replays. In addition, performance evaluation showed that it has the lowest communication costs and average computation overheads. Moreover, it exhibited a 27.1% increase in handover success rate, and a 24.1% reduction in ping pong rate.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"113 ","pages":"Article 102546"},"PeriodicalIF":4.8000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404821003709","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 6

Abstract

The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as vehicular communications, internet of everything (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and handover authentications present some challenges. To facilitate seamless connectivity in 5G and B5G networks, numerous machine learning schemes have been developed to facilitate target cell selection based on parameters such as signal strength and signal to noise ratio (SNR). However, most of these approaches concentrate on performance enhancements, ignoring security and privacy issues. On their part, majority of the conventional handover authentication schemes exhibit long latencies which contravenes 5G and B5G requirements. Moreover, the base stations in these networks have very small footprints and hence require the deployment of numerous base stations within the coverage area. This serves to compound performance, security and privacy issues due to the resulting frequent handovers. In this paper, a multilayer neural network (MLNN) privacy and security preservation protocol is presented. To facilitate target cell selection, parameters that took user satisfaction, network, user equipment (UE) and service requirements into consideration were deployed so as to enhance both quality of service (QoS) and quality of experience (QoE) during and after handover. For handover security, timestamps, ephemerals and random nonces were deployed during handover authentication to offer both security and privacy. Formal security analysis using Burrows-Abadi-Needham (BAN) showed that the proposed protocol offered strong mutual authentication among the communicating entities. On the other hand, informal security analysis showed that the proposed protocol offers perfect forward key secrecy and is robust against attacks such as impersonation and packet replays. In addition, performance evaluation showed that it has the lowest communication costs and average computation overheads. Moreover, it exhibited a 27.1% increase in handover success rate, and a 24.1% reduction in ping pong rate.

5G及以上网络的高效切换协议
第五代(5G)及5G以上(B5G)网络提供超低延迟、更高可靠性、可扩展性、数据速率和容量,以支持车辆通信、万物互联(IoE)和设备对设备(D2D)通信等应用。尽管有这些优秀的特性,用户隐私、资源管理和移交身份验证仍然存在一些挑战。为了促进5G和B5G网络的无缝连接,已经开发了许多机器学习方案,以促进基于信号强度和信噪比(SNR)等参数的目标细胞选择。然而,这些方法大多侧重于性能增强,而忽略了安全和隐私问题。在这一方面,大多数传统的切换认证方案都存在较长的延迟,这与5G和B5G的要求相违背。此外,这些网络中的基站占用空间很小,因此需要在覆盖区域内部署许多基站。由于频繁的切换,这会导致性能、安全性和隐私问题的复杂化。提出了一种多层神经网络(MLNN)的隐私与安全保护协议。为了方便目标小区的选择,部署了考虑用户满意度、网络、用户设备(UE)和业务需求的参数,以提高切换期间和切换后的服务质量(QoS)和体验质量(QoE)。在切换安全性方面,在切换认证过程中部署了时间戳、短暂时间和随机随机数,以提供安全性和隐私性。使用BAN (Burrows-Abadi-Needham)进行的形式化安全分析表明,该协议在通信实体之间提供了强的相互认证。另一方面,非正式的安全分析表明,所提出的协议提供了完美的前向密钥保密性,并且对模拟和数据包重放等攻击具有鲁棒性。此外,性能评估表明,它具有最低的通信成本和平均计算开销。此外,交接成功率提高了27.1%,乒乓率降低了24.1%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信