可证明的5G HetNets安全协议

V. O. Nyangaresi
{"title":"可证明的5G HetNets安全协议","authors":"V. O. Nyangaresi","doi":"10.1109/comcas52219.2021.9629066","DOIUrl":null,"url":null,"abstract":"The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.","PeriodicalId":354885,"journal":{"name":"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)","volume":"510 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Provably Secure Protocol for 5G HetNets\",\"authors\":\"V. O. Nyangaresi\",\"doi\":\"10.1109/comcas52219.2021.9629066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.\",\"PeriodicalId\":354885,\"journal\":{\"name\":\"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)\",\"volume\":\"510 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/comcas52219.2021.9629066\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/comcas52219.2021.9629066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

第五代(5G)网络具有高数据速率和容量,使其适合物联网(IoT)和移动银行等应用。由于在这些应用程序中交换的数据的敏感性,安全和隐私保护方案对于它们的部署至关重要。第三代合作伙伴计划(3GPP)指定了演进分组系统认证和密钥协议(EPSAKA)和5G AKA协议,用于相互认证通信实体。然而,这些协议容易受到诸如冒充、拒绝服务(DoS)、劫持和数据包重放等攻击。因此,已经引入了基于区块链、公钥加密和证书等技术的其他方案来应对这些威胁。不幸的是,这些算法要么具有较高的计算和通信开销,要么无法有效地防止这些攻击。本文提出了一种新的密钥协议和认证协议。安全评估表明,该协议支持向后和向前密钥保密,并且对特权内部人员和隐私侵犯等攻击具有鲁棒性。在性能方面,与其他相关方案相比,它具有平均的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Provably Secure Protocol for 5G HetNets
The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信