Enhancing Security in Multi-Controller SDMN Environments: A Novel 5G Access Authentication Protocol

被引:0
|
作者
Moatemri, Maroua [1 ,2 ]
Eltaief, Hamdi [1 ,2 ]
Youssef, Habib [1 ,2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] ISITC Hammam Sousse, PRINCE Lab, Sousse, Tunisia
关键词
SDMN; Multi-controller; East-west communication; 5G; Authentication; Hierarchical architecture; Security;
D O I
10.1109/IWCMC61514.2024.10592568
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, mobility has become one of the most important aspects of all networks, including multi-controller SDMNs. Once authenticated, mobile users must be able to move freely between domains without losing access to the provided network services. To this aim, once authenticated, mobile users must be able to re-authenticate every time they move from their original domains. In this study, we present a novel 5G access authentication protocol designed specifically for multi-controller SDMN environments. The paper elaborates on the initial authentication procedure as well as the re-authentication process inherent to this protocol. In our proposed protocol the mobile user will not need to reach the authentication server for the re-authentication process. It provides the controller with its MSK token allowing him to approve the re-authentication request if the MSK token is valid. This will generate low latency improvement in terms of handover time. A comprehensive analysis is conducted to assess the robustness of the proposed authentication mechanism against diverse cyber attacks. Furthermore, an analytical equation for quantifying the communication costs involved in both the initial authentication and subsequent re-authentication processes is provided. In addition, to validate the security robustness of the proposed 5G access authentication protocol, we utilize the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.
引用
收藏
页码:993 / 998
页数:6
相关论文
共 50 条
  • [21] ORCHESTRA 2.0: Enhancing a multi-access solution to address 5G challenges
    Pinheiro, Joao Francisco Nunes
    Municio, Esteban
    Leysen, Christiaan
    Marquez-Barja, Johann M.
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [22] Security and Protocol Exploit Analysis of the 5G Specifications
    Jover, Roger Piqueras
    Marojevic, Vuk
    IEEE ACCESS, 2019, 7 : 24956 - 24963
  • [23] 5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance
    Nencioni, Gianfranco
    Garroppo, Rosario G. G.
    Olimid, Ruxandra F. F.
    IEEE ACCESS, 2023, 11 : 63496 - 63533
  • [24] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [25] Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
    Hakeem, Shimaa A. Abdel
    Kim, Hyungwon
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (07)
  • [26] The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G
    Abdulqadder, Ihsan H.
    Zou, Deqing
    Aziz, Israa T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 339 - 354
  • [27] Design of Novel 5G Transport Protocol
    Petrov, Ivan
    Janevski, Toni
    2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2016, : P29 - P33
  • [28] 5G-SSAAC: Slice-specific Authentication and Access Control in 5G
    Behrad, Shanay
    Bertin, Emmanuel
    Tuffin, Sephane
    Crespi, Noel
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), 2019, : 281 - 285
  • [29] A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection
    Chen, Zigang
    Ao, Jin
    Luo, Wenjun
    Cheng, Zhiquan
    Liu, Yuhong
    Sheng, Kai
    Chen, Long
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [30] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):