scispace - formally typeset
Proceedings ArticleDOI

DC and CoMP Authentication in LTE-Advanced 5G HetNet

TLDR
This work proposes a scheme which uses software-defined networking architecture and creates a Merkle-Tree for fast authentication and key establishment that can fulfill 5G latency requirements and can reduce communication, computation and energy cost.
Abstract
Use of Heterogeneous networks is essential to achieve the goal of 5G networks. In 5G LTE- Advanced HetNet, latency requirements make secure authentication and key establishment challenging. Dual Connectivity and Coordinated Multi Point are key technologies for LTE-Advanced HetNet. They require performing multiple authentications with low latency. We propose a scheme which uses software-defined networking architecture and creates a Merkle-Tree for fast authentication and key establishment. Furthermore, it can fulfill 5G latency requirements. We present a formal proof of logic correctness and performance analysis with existing schemes. Compared with existing methods our scheme can reduce communication, computation and energy cost.

read more

Citations
More filters
Journal ArticleDOI

Robust and Universal Seamless Handover Authentication in 5G HetNets

TL;DR: Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies, and formal security proofs indicate that RRush resists various attacks.
Journal ArticleDOI

Is 5G Handover Secure and Private? A Survey

TL;DR: Security and privacy requirements in handovers to resist potential attacks are summarized and secure and privacy-preserving handover schemes are reviewed by categorizing them into two scenarios, i.e., vertical handover and horizontal handover.
Journal ArticleDOI

A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks

TL;DR: A comprehensive survey and classification of MLbased V2X Misbehavior Detection Systems and some learned lessons and recommendations helping in developing, validating, and deploying ML-based MDSs are presented.
Book ChapterDOI

Blockchain-Based Mobility Management for LTE and Beyond

TL;DR: This novel approach, Blockchain Key Derivation Function (BKDF), ensures tighter security as well as faster handover between the base stations and mobile devices in the pre-handover phase, and reduces handover latency and improves link stability with decrease in packet loss in the intra- handover phase.
Posted Content

Are Mobility Management Solutions Ready for 5G and Beyond

TL;DR: In this paper, the authors present a qualitative assessment of the state-of-the-art mechanisms based on their ability to satisfy the reliability, flexibility and scalability criteria for future mobility management (MM) strategies.
References
More filters
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper shows how various protocols differ subtly with respect to the required initial assumptions of the participants and their final beliefs, and explains the formalism used to isolate and express these differences with a precision that was not previously possible.
Journal ArticleDOI

Proactive key distribution using neighbor graphs

TL;DR: A novel data structure, the neighbor graph, that dynamically captures the mobility topology of a wireless network is introduced and it is shown how neighbor graphs can be utilized to obtain a 99 percent reduction in the authentication time of an IEEE 802.11 handoff.
Journal ArticleDOI

Authentication handover and privacy protection in 5G hetnets using software-defined networking

TL;DR: The objective is to simplify authentication handover by global management of 5G HetNets through sharing of userdependent security context information among related access points and demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications.
Related Papers (5)