A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC

被引:1
|
作者
Ranaweera, Pasika [1 ]
Yadav, Awaneesh Kumar [2 ]
Liyanage, Madhusanka [1 ]
Jurcut, Anca Delia [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
[2] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
基金
爱尔兰科学基金会;
关键词
Authentication; edge computing; federated identity verification; MEC; security framework; service migration; KEY EXCHANGE; SECURITY;
D O I
10.1109/TDSC.2023.3320647
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing paradigms were an expedient innovation for elevating the contemporary standards of mobile and Internet networks. As specified in Multi-Access Edge Computing (MEC) standardization, edge computing serviceable infrastructures are running on virtualization technologies to provide dynamic and flexible service instances. Since the inception and operation of the services are executing at the edge level gNodeBs (gN Bs), migration of services between gN Bs is an imminent occurrence in edge computing that is contriving challenges to its feasible deployment. Security and service level latency requirements are vital parameters for such service migration operations conducted through gN B to gN B (g2g) connecting channels. In this paper, our focus is to ensure identity verification among the parties involved in a service migration through authentication and to secure the migrating content through a robust g2g channel establishment. Our proposed authentication protocol was designed in accordance with the MEC architectural standardization. We have verified the proposed protocol employing four different formal verification techniques: Scyther and AVISPA verification tools, GNY and ROR logical approaches. Further, we have developed the proposed protocol in a test-bed environment emulating the MEC system with an integrated 5G Core network.
引用
收藏
页码:2930 / 2948
页数:19
相关论文
共 50 条
  • [31] 5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks
    Xiao, Yuelei
    Wu, Yang
    INFORMATION, 2022, 13 (03)
  • [32] Location based Authentication Service using 4G/5G Devices
    Nisar, Farhan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 120 - 126
  • [33] Handover Prediction Integrated with Service Migration in 5G Systems
    Abdah, Hadeel
    Barraca, Joao Paulo
    Aguiar, Rui L.
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [34] 5G MEC分流方案探讨
    何宇锋
    林奕琳
    单雨威
    移动通信, 2020, 44 (09) : 49 - 57
  • [35] The 5G MEC Applications in Smart Manufacturing
    Mu, Ning
    Gong, Shulei
    Sun, Wanqing
    Gan, Quan
    2020 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (EDGE 2020), 2020, : 45 - 48
  • [36] On Minimizing Service Access Latency: Employing MEC on the Fronthaul of Heterogeneous 5G Architectures
    Makris, Nikos
    Passas, Virgilios
    Nanis, Christos
    Korakis, Thanasis
    2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN 2019), 2019,
  • [37] Flexible MEC service consumption through edge host zoning in 5G networks
    Filippou, Miltiades C.
    Sabella, Dario
    Riccobene, Vincenzo
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
  • [38] A secure and efficient handover authentication and key management protocol for 5G networks
    Huang, Jia Qi
    Qian, Yi
    Journal of Communications and Information Networks, 2020, 5 (01) : 40 - 49
  • [39] The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks
    Fei, Teng
    Wang, Wenye
    COMPUTER NETWORKS, 2023, 228
  • [40] A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks
    Miao, Junfeng
    Wang, Zhaoshun
    Miao, Xue
    Xing, Longyue
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021