{"title":"可证明的5G HetNets安全协议","authors":"V. O. Nyangaresi","doi":"10.1109/comcas52219.2021.9629066","DOIUrl":null,"url":null,"abstract":"The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.","PeriodicalId":354885,"journal":{"name":"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)","volume":"510 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Provably Secure Protocol for 5G HetNets\",\"authors\":\"V. O. Nyangaresi\",\"doi\":\"10.1109/comcas52219.2021.9629066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.\",\"PeriodicalId\":354885,\"journal\":{\"name\":\"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)\",\"volume\":\"510 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/comcas52219.2021.9629066\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/comcas52219.2021.9629066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

第五代(5G)网络具有高数据速率和容量,使其适合物联网(IoT)和移动银行等应用。由于在这些应用程序中交换的数据的敏感性,安全和隐私保护方案对于它们的部署至关重要。第三代合作伙伴计划(3GPP)指定了演进分组系统认证和密钥协议(EPSAKA)和5G AKA协议,用于相互认证通信实体。然而,这些协议容易受到诸如冒充、拒绝服务(DoS)、劫持和数据包重放等攻击。因此,已经引入了基于区块链、公钥加密和证书等技术的其他方案来应对这些威胁。不幸的是,这些算法要么具有较高的计算和通信开销,要么无法有效地防止这些攻击。本文提出了一种新的密钥协议和认证协议。安全评估表明,该协议支持向后和向前密钥保密,并且对特权内部人员和隐私侵犯等攻击具有鲁棒性。在性能方面,与其他相关方案相比,它具有平均的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Provably Secure Protocol for 5G HetNets
The fifth generation (5G) networks exhibit high data rates and capacities that endear them to applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data exchanged in these applications, security and privacy preservation schemes are essential for their deployments. The Third Generation Partnership Project (3GPP) has specified evolved packet system authentication and key agreement (EPSAKA) and 5G AKA protocols for mutually authenticating the communicating entities. However, these protocols are vulnerable to attacks such as impersonation, denial of service (DoS), hijacking and packet replays. Consequently, other schemes based on technologies such as blockchain, public key cryptography and certificates have been introduced to counter these threats. Unfortunately, these algorithms have either high computation and communication overheads or fail to effectively prevent these attacks. In this paper, a new key agreement and authentication protocol is presented. Security evaluation shows that this protocol upholds backward and forward key secrecy, and is robust against attacks such as privileged insider and privacy violations. In terms of performance, it exhibits average computation overheads compared with other related schemes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance Enhancement of Integrated Circuits and Power Devices via Embedded Diamond Heat Management A Balanced, Series Fed Horn Array Antenna Modeling and Analysis of Spatial Distributions of Users in Massive MIMO Systems Ultra-Wideband Transmission Lines on Complex Structures via Extendable Aerosol Jet 3D-Printing Recent Progress in Revision of IEEE Std 1720-2012 Recommended Practice for Near-Field Antenna Measurements
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1