Vincent Omollo Nyangaresi , Anthony Joachim Rodrigues
{"title":"Efficient handover protocol for 5G and beyond networks","authors":"Vincent Omollo Nyangaresi , Anthony Joachim Rodrigues","doi":"10.1016/j.cose.2021.102546","DOIUrl":null,"url":null,"abstract":"<div><p><span><span><span><span>The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as </span>vehicular communications, </span>internet of everything<span><span><span> (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and handover </span>authentications present some challenges. To facilitate seamless connectivity in 5G and B5G networks, numerous </span>machine learning schemes have been developed to facilitate target cell selection based on parameters such as signal strength and </span></span>signal to noise ratio<span> (SNR). However, most of these approaches concentrate on performance enhancements, ignoring security and privacy issues. On their part, majority of the conventional handover authentication schemes<span> exhibit long latencies which contravenes 5G and B5G requirements. Moreover, the base stations in these networks have very small footprints and hence require the deployment of numerous base stations within the coverage area. This serves to compound performance, security and privacy issues due to the resulting frequent handovers. In this paper, a multilayer neural network (MLNN) privacy and security preservation protocol is presented. To facilitate target cell selection, parameters that took user satisfaction, network, user equipment (UE) and service requirements into consideration were deployed so as to enhance both quality of service (QoS) and </span></span></span>quality of experience (QoE) during and after handover. For handover security, timestamps, ephemerals and random nonces were deployed during handover authentication to offer both security and privacy. Formal security analysis using Burrows-Abadi-Needham (BAN) showed that the proposed protocol offered strong mutual authentication among the communicating entities. On the other hand, informal security analysis showed that the proposed protocol offers perfect forward key secrecy and is robust against attacks such as impersonation and packet replays. In addition, performance evaluation showed that it has the lowest communication costs and average computation overheads. Moreover, it exhibited a 27.1% increase in handover success rate, and a 24.1% reduction in ping pong rate.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"113 ","pages":"Article 102546"},"PeriodicalIF":4.8000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404821003709","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 6
Abstract
The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher reliability, scalability, data rates and capacities to support applications such as vehicular communications, internet of everything (IoE) and device to device (D2D) communication. In spite of these excellent features, user privacy, resource management and handover authentications present some challenges. To facilitate seamless connectivity in 5G and B5G networks, numerous machine learning schemes have been developed to facilitate target cell selection based on parameters such as signal strength and signal to noise ratio (SNR). However, most of these approaches concentrate on performance enhancements, ignoring security and privacy issues. On their part, majority of the conventional handover authentication schemes exhibit long latencies which contravenes 5G and B5G requirements. Moreover, the base stations in these networks have very small footprints and hence require the deployment of numerous base stations within the coverage area. This serves to compound performance, security and privacy issues due to the resulting frequent handovers. In this paper, a multilayer neural network (MLNN) privacy and security preservation protocol is presented. To facilitate target cell selection, parameters that took user satisfaction, network, user equipment (UE) and service requirements into consideration were deployed so as to enhance both quality of service (QoS) and quality of experience (QoE) during and after handover. For handover security, timestamps, ephemerals and random nonces were deployed during handover authentication to offer both security and privacy. Formal security analysis using Burrows-Abadi-Needham (BAN) showed that the proposed protocol offered strong mutual authentication among the communicating entities. On the other hand, informal security analysis showed that the proposed protocol offers perfect forward key secrecy and is robust against attacks such as impersonation and packet replays. In addition, performance evaluation showed that it has the lowest communication costs and average computation overheads. Moreover, it exhibited a 27.1% increase in handover success rate, and a 24.1% reduction in ping pong rate.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.