Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Autor: | Shaiful Jahari Hashim, Kamal Ali Alezabi, Borhanuddin Mohd Ali, Fazirulhisyam Hashim, Abbas Jamalipour |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
Computer Networks and Communications
Computer science lcsh:TK7800-8360 02 engineering and technology Authentication server lcsh:Telecommunication lcsh:TK5101-6720 Secrecy 0202 electrical engineering electronic engineering information engineering EAP-AKA ′ authentication Fast re-authentication Authentication Wireless network business.industry ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS lcsh:Electronics 020206 networking & telecommunications Energy consumption Computer Science Applications Handover Authentication protocol Signal Processing 020201 artificial intelligence & image processing AVISPA business Heterogeneous network 5G Computer network |
Zdroj: | EURASIP Journal on Wireless Communications and Networking, Vol 2020, Iss 1, Pp 1-34 (2020) |
ISSN: | 1687-1499 |
DOI: | 10.1186/s13638-020-01702-8 |
Popis: | In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |