Design of Secure Authentication Handover Protocol for Innovative Mobile Multimedia Services in 5G MEC Environments

被引:1
|
作者
Kim, Jiyoon [1 ]
Han, Dong-Guk [2 ]
You, Ilsun [2 ]
机构
[1] Gyeongsang Natl Univ, Sch Comp Sci, Jinju, South Korea
[2] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2022年 / 23卷 / 06期
关键词
Authentication; 5G; Handover; AKMA; Formal verification; VERIFICATION;
D O I
10.53106/160792642022112306008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G advanced technology has introduced innovative multimedia services, thus propelling the rise of the mobile multimedia market. While the ubiquity of mobile multimedia services has boosted customer convenience, it has also unlocked the way to possible security concerns that potentially damage users' privacy and service providers' properties. Several standards and researches have been proposed to counter these threats, notably those concentrating on authentication between users and service applications. Unfortunately, these studies are limited to address a new challenge, secure handover among distributed application functions in 5G Multi-access Edge Cloud (MEC) environments. Motivated by this, we present a handover authentication protocol with push-key and pull-key optimization options in 5G mobile multimedia application services. The proposed protocol provides mutual authentication, secure key exchange, confidentiality, and integrity. Furthermore, it also supports perfect forward secrecy, optimal handover, and anonymity, which were not previously considered in prior studies. While formal verification through BAN Logic and Scyther proved that the protocol is secure against attacks that violate the supported security requirements, comparative analysis of the proposed protocol against existing studies demonstrates that the protocol is simultaneously efficient.
引用
收藏
页码:1245 / 1261
页数:17
相关论文
共 50 条
  • [41] A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKA
    Gharsallah, Ikram
    Smaoui, Salima
    Zarai, Faouzi
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1311 - 1316
  • [42] Secure and Efficient Authentication and Key Agreement Scheme for Multicast Services in 5G Vehicular to Everything
    Zhang, Yinghui
    Li, Guoteng
    Han, Gang
    Cao, Jin
    Zheng, Dong
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (07): : 3026 - 3035
  • [43] Incoming Traffic Control of Fronthaul in 5G Mobile Network for Massive Multimedia Services
    Kim, Dae-Young
    Kim, Seokhoon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (26-27) : 34443 - 34458
  • [44] Incoming Traffic Control of Fronthaul in 5G Mobile Network for Massive Multimedia Services
    Dae-Young Kim
    Seokhoon Kim
    Multimedia Tools and Applications, 2021, 80 : 34443 - 34458
  • [45] Fast and Efficient Physical Layer Authentication for 5G HetNet Handover
    Ma, Ting
    Hu, Feng
    Ma, Maode
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 269 - 271
  • [46] A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
    Ogundoyin, Sunday Oyinlola
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (05) : 509 - 539
  • [47] General Multimedia Trust Authentication Framework for 5G Networks
    Xing, Ling
    Ma, Qiang
    Wu, Honghai
    Xie, Ping
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [48] Formal verification of secondary authentication protocol for 5G secondary authentication
    Edris E.K.K.
    Aiash M.
    Loo J.K.-K.
    Alhakeem M.S.
    International Journal of Security and Networks, 2021, 16 (04): : 223 - 234
  • [49] Design of Secure Authentication Protocol in SOCKS V5 for VPN using Mobile Phone
    Garg, Richa
    Patel, Kalgi
    Gupta, Mayank
    Islam, S. K. Hafizul
    Amin, Ruhul
    Biswas, G. P.
    2015 INTERNATIONAL CONFERENCE ON TRENDS IN AUTOMATION, COMMUNICATIONS AND COMPUTING TECHNOLOGY (I-TACT-15), 2015,
  • [50] Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
    Zhang, Yinghui
    Qian, Jiale
    Cao, Jin
    Zheng, Dong
    Tongxin Xuebao/Journal on Communications, 2023, 44 (08): : 144 - 154