Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol

被引:0
|
作者
Moatemri, Maroua [1 ,2 ]
Eltaief, Hamdi [1 ,2 ]
Youssef, Habib [1 ,2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] ISITC Hammam Sousse, PRINCE Lab, Sousse, Tunisia
关键词
SDMN; Multi-controller; East-west communication; 5G; Authentication; Hierarchical architecture; Security;
D O I
10.1109/IWCMC61514.2024.10592568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, mobility has become one of the most important aspects of all networks, including multi-controller SDMNs. Once authenticated, mobile users must be able to move freely between domains without losing access to the provided network services. To this aim, once authenticated, mobile users must be able to re-authenticate every time they move from their original domains. In this study, we present a novel 5G access authentication protocol designed specifically for multi-controller SDMN environments. The paper elaborates on the initial authentication procedure as well as the re-authentication process inherent to this protocol. In our proposed protocol the mobile user will not need to reach the authentication server for the re-authentication process. It provides the controller with its MSK token allowing him to approve the re-authentication request if the MSK token is valid. This will generate low latency improvement in terms of handover time. A comprehensive analysis is conducted to assess the robustness of the proposed authentication mechanism against diverse cyber attacks. Furthermore, an analytical equation for quantifying the communication costs involved in both the initial authentication and subsequent re-authentication processes is provided. In addition, to validate the security robustness of the proposed 5G access authentication protocol, we utilize the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.
引用
收藏
页码:993 / 998
页数:6
相关论文
共 50 条
  • [1] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [2] Round-Efficient Security Authentication Protocol for 5G Network
    Geng, Guining
    Miao, Junfeng
    Xiao, Nan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 269 - 283
  • [3] SDN based Operator Assisted Offloading Platform for Multi-Controller 5G Networks
    Liyanage, Madhusanka
    Dananjaya, Mahesh
    Okwuibe, Jude
    Ylianttila, Mika
    2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2017,
  • [4] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22
  • [5] Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Miao J.
    Wang Z.
    Wang M.
    Feng X.
    Xiao N.
    Sun X.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [6] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)
  • [7] A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC
    Ranaweera, Pasika
    Yadav, Awaneesh Kumar
    Liyanage, Madhusanka
    Jurcut, Anca Delia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2930 - 2948
  • [8] A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond
    Lai, Chengzhe
    Ma, Yixiao
    Lu, Rongxing
    Zhang, Yinghui
    Zheng, Dong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2970 - 2987
  • [9] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [10] 5G Security Artifacts (DoS / DDoS and Authentication)
    Javed, M. Awais
    Niazi, Sohaib Khan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 127 - 133