V. O. Nyangaresi, Z. Abduljabbar, Mustafa A. Al Sibahee, I. Q. Abduljaleel, Enas Wahab Abood
{"title":"5G网络的安全与隐私保护","authors":"V. O. Nyangaresi, Z. Abduljabbar, Mustafa A. Al Sibahee, I. Q. Abduljaleel, Enas Wahab Abood","doi":"10.1109/TELFOR52709.2021.9653385","DOIUrl":null,"url":null,"abstract":"The Fifth Generation (5G) networks support various service delivery models such as Device to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc Networks (VANETS) among others. In these networks, massive personal and private data items are being exchanged among numerous heterogeneous devices. As such, security and privacy leaks can have devastating repercussions. Many protocols have been presented for device authentication, starting with Authentication and Key Agreement (AKA) introduced by the Third-Generation Partnership Project (3GPP). Numerous attacks have been described against this AKA protocol and hence other schemes have been presented in literature. Although they address some of these security and privacy issues, some of these schemes are inefficient while others are still susceptible to other attacks. In this paper, a protocol that protects the exchanged packets against ephemeral leakages, man-in-the-middle, impersonation and offline guessing attacks is presented. In terms of bandwidth requirements and execution time, the proposed protocol had the lowest values among its peers.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Towards Security and Privacy Preservation in 5G Networks\",\"authors\":\"V. O. Nyangaresi, Z. Abduljabbar, Mustafa A. Al Sibahee, I. Q. Abduljaleel, Enas Wahab Abood\",\"doi\":\"10.1109/TELFOR52709.2021.9653385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Fifth Generation (5G) networks support various service delivery models such as Device to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc Networks (VANETS) among others. In these networks, massive personal and private data items are being exchanged among numerous heterogeneous devices. As such, security and privacy leaks can have devastating repercussions. Many protocols have been presented for device authentication, starting with Authentication and Key Agreement (AKA) introduced by the Third-Generation Partnership Project (3GPP). Numerous attacks have been described against this AKA protocol and hence other schemes have been presented in literature. Although they address some of these security and privacy issues, some of these schemes are inefficient while others are still susceptible to other attacks. In this paper, a protocol that protects the exchanged packets against ephemeral leakages, man-in-the-middle, impersonation and offline guessing attacks is presented. In terms of bandwidth requirements and execution time, the proposed protocol had the lowest values among its peers.\",\"PeriodicalId\":330449,\"journal\":{\"name\":\"2021 29th Telecommunications Forum (TELFOR)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 29th Telecommunications Forum (TELFOR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TELFOR52709.2021.9653385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 29th Telecommunications Forum (TELFOR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELFOR52709.2021.9653385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Security and Privacy Preservation in 5G Networks
The Fifth Generation (5G) networks support various service delivery models such as Device to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc Networks (VANETS) among others. In these networks, massive personal and private data items are being exchanged among numerous heterogeneous devices. As such, security and privacy leaks can have devastating repercussions. Many protocols have been presented for device authentication, starting with Authentication and Key Agreement (AKA) introduced by the Third-Generation Partnership Project (3GPP). Numerous attacks have been described against this AKA protocol and hence other schemes have been presented in literature. Although they address some of these security and privacy issues, some of these schemes are inefficient while others are still susceptible to other attacks. In this paper, a protocol that protects the exchanged packets against ephemeral leakages, man-in-the-middle, impersonation and offline guessing attacks is presented. In terms of bandwidth requirements and execution time, the proposed protocol had the lowest values among its peers.