scholarly journals Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network

2020 ◽  
Vol 10 (2) ◽  
pp. 727
Author(s):  
Seonghyeon Gong ◽  
Abir EL Azzaoui ◽  
Jeonghun Cha ◽  
Jong Hyuk Park

The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture uses the secondary authentication for mutual authentication between the User Equipment (UE) and the Data Network (DN) to authenticate devices and services. However, this authentication mechanism can cause a signaling storm in the Non-Access Stratum (NAS) because the end node needs to communicate with the authentication server of the NAS area. This problem could affect the availability of the network when the network is extended. This research proposes a mutual authentication framework that can efficiently perform a mutual authentication process through secondary authentication between UE and DN. The proposed framework uses newly devised network functions: Secondary Authentication Function (SAF) and the Authentication Data Management Function (ADMF). This framework proposes a methodology at the protocol level for efficient mutual authentication using the mobile edge computing architecture. We analyzed the proposed framework in the point of security considerations, and we evaluated the effect of the framework on the traffic of the NAS layer and user experience. Our simulation results show that the proposed framework can reduce the NAS traffic by 39% and total traffic of the overall network by 10%.

Author(s):  
Phudit Ampririt ◽  
Ermioni Qafzezi ◽  
Kevin Bylykbashi ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
...  

The fifth generation (5G) network is expected to be flexible to satisfy quality of service (QoS) requirements, and the software-defined network (SDN) with network slicing will be a good approach for admission control. In this paper, the authors present and compare two fuzzy-based schemes to evaluate the QoS (FSQoS). They call these schemes FSQoS1 and FSQoS2. The FSQoS1 considers three parameters: slice throughput (ST), slice delay (SD), and slice loss (SL). In FSQoS2, they consider as an additional parameter the slice reliability (SR). So, FSQoS2 has four input parameters. They carried out simulations for evaluating the performance of the proposed schemes. From simulation results, they conclude that the considered parameters have different effects on the QoS performance. The FSQoS2 is more complex than FSQoS1, but it has a better performance for evaluating QoS. When ST and SR are increasing, the QoS parameter is increased. But, when SD and SL are increasing, the QoS is decreased. When ST is 0.1, SD is 0.1, SL is 0.1, and the QoS is increased by 32.02% when SR is increased from 0.3 to 0.8.


2019 ◽  
Vol 2019 ◽  
pp. 1-9 ◽  
Author(s):  
Xi Meng ◽  
Liyuan Zhong ◽  
Dong Zhou ◽  
Dacheng Yang

It is a promising way to successfully operate the fifth generation (5G) system with Internet of Things (IoT) in potential mmWave spectrum bands. This paper investigates the intelligent co-channel coexistence between the 5G IoT system and the fixed-satellite service (FSS) system at 40 GHz. The key issue, as identified, is the accurate estimation of interference based on mmWave propagation characteristics. Our simulation results reveal that interference from the 5G IoT system into the FSS ground stations can be kept below the protection threshold by considering different deployment parameters, such as antenna patterns, height of Earth station (ES), and separation distance.


Author(s):  
Simon Wissam Tarbouche ◽  
Abdel-Nasser Assimi

Generalized frequency division multiplexing (GFDM) is a prominent candidate to be used by the mobile Fifth Generation (5G) physical layer. Nevertheless, the integration of GFDM with Spatial Multiplexing (SM) MIMO system is essential to fulfill the data rate requirements. SM detection of MIMO-GFDM becomes a more challenging topic because of ICI and ISI due to the non-orthogonal nature of GFDM, along with IAI. In this article, the authors propose a system that combines the Offset-Quadrature Amplitude Modulation (OQAM) with GFDM to mitigate self-induced interference, by using a simple Matched Filter (MF) detector and minimum additional processing at the receiver. Simulation results show a considerable achieved improvement in BER by the proposed OQAM/GFDM compared to QAM/GFDM when using MMSE-based Ordered Successive Interference Cancellation (OSIC) detector. Furthermore, this system is unaffected by the roll-off factor variations of used pulse-shaping filters.


2018 ◽  
Vol 7 (3.36) ◽  
pp. 13
Author(s):  
Muhammad Sani Yahya ◽  
Ishaku Abdul Dalyop ◽  
Yusuf Saleh ◽  
Murtala Aminu-Baba

The design of compact dual band grid array antenna (GAA) designed on FR-4 substrate for future Fifth Generation (5G) Mobile Communications at 10 GHz is reported. The proposed antenna uses coaxial technique of feeding and has a dimension of 48 mm × 55 mm × 1.6 mm. Simulation results using CST microwave studio illustrates that the antenna has a band from 10.03 GHz to 10.68 GHz and another band from 10.7 GHz to 12.23 GHz. This excludes the 10.68 – 10.7 GHz band in which emissions were forbidden by the Radio Regulations in the sense that it has been allocated for the Radio Astronomy, Space Research and Earth Exploration Satellite (passive). The antenna has a maximum gain of 8.03 dBi at 10 GHz, thus a good candidate for the future 5G mobile communications. 


2020 ◽  
Vol 10 (22) ◽  
pp. 8291
Author(s):  
Anuj Kumar Singh ◽  
Arun Solanki ◽  
Anand Nayyar ◽  
Basit Qureshi

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.


2018 ◽  
Vol 56 (1) ◽  
pp. 102 ◽  
Author(s):  
Nguyen Huu Trung ◽  
Doan Thanh Binh

This paper proposes a novel Large-scale (massive) Multi-input Multi-output Multi-carrier Code division multiple access (LS MIMO MC-CDMA) model and application to Fifth-Generation Mobile Communication Systems (5G). This system uses combined cylindrical array antenna multiple beamforming architecture with spatial multiplexing. The model is optimized by Min-Max criteria in order to minimize side lobes and maximize compression of propagation loss. The Monte Carlo simulation results unify with the analytical solution for system performance.


Author(s):  
Bharathkumar Ravichandran

In the fifth generation mobile communication architecture (5G), network functions which traditionally existed as discrete hardware entities based on custom architectures, are replaced with dynamic, scalable Virtual Network Functions (VNF) that run on general purpose (x86) cloud computing platforms, under the paradigm Network Function Virtualization (NFV). The shift towards a virtualized infrastructure poses its own set of security challenges that need to be addressed. One such challenge that we seek to address in this paper is providing integrity, authenticity and confidentiality protection for VNFs.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1915
Author(s):  
Lambros Sakkas ◽  
Eleftherios Stergiou ◽  
Georgios Tsoumanis ◽  
Constantinos T. Angelis

5G is the latest mobile communications standard that is spreading fast across the world. Recently defined requirements for 5G systems have led to higher applications’ requirements regarding data rates, lower requirements for latency, and higher efficiency regarding the spectrum usage. Universal Filtered Multi-Carrier (UFMC) is one new candidate modulation scheme for emergent Fifth Generation (5G) communication systems. This paper focuses on Universal Filtered Multi-Carrier (UFMC) design aspects in terms of Bit Error Rate (BER) performance in relation to the filter length used in subband filtering. Simulation results show that BER and CCDF performance varies for different filter lengths and modulation schemes. The main achievement of this work is that the results show that different Dolph–Chebyshev FIR filter lengths do not affect the BER performance both for the 64 and 256 QAM.


2021 ◽  
Author(s):  
Xiaoying Guo

Wireless networking is becoming increasingly popular. However, the use of Wireless Local Area Networks (WLAN) also creates many security issues that do not exist in a wired world. WLAN connection no longer requires cable. Instead, data packets are sent on the air and are available to anyone with the ability to intercept and decode them. Traditional physical security measures like firewalls and security guards are less efficient in this new domain. The IEEE has organized the 802.11i Task Group to address 802.11 security. To solve the user authentication problem, it adopted 802.1x standard. The standard relies on Extensible Authentication Protocol (EAP) to provide the authentication function. However, after the basic EAP authentication process, the Access Point (AP) still needs to be authenticated by the client. In order to implement mutual authentication, Protected EAP (PEAP), EAP-Transport Layer Security (TLS), EAP-Tunneled TLS (TTLS) or other variants of EAP are developed. But some [are] still weak in the authentication procedure. In this thesis, a new authentication mechanism called Modified EAP (MEAP) is proposed. MEAP is based on PEAP. MEAP adds a TLS layer on top of EAP, and then uses the resulting TLS session as a tunnel to protect the later Simple Password-authenticated Exponential Key Exchange (SPEKE), which is a strong password method. MEAP can provide mutual authentication to satisfy strong authentication requirements in WLAN.


Sign in / Sign up

Export Citation Format

Share Document