Securing 5G HetNets Using Mutual Physical Layer Authentication | Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City (2024)

research-article

Authors: Ting Ma, Feng Hu, and Maode Ma

ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City

December 2019

Pages 275 - 278

Published: 20 March 2020 Publication History

  • 3citation
  • 154
  • Downloads

Metrics

Total Citations3Total Downloads154

Last 12 Months14

Last 6 weeks0

  • Get Citation Alerts

    New Citation Alert added!

    This alert has been successfully added and will be sent to:

    You will be notified whenever a record that you have chosen has been cited.

    To manage your alert preferences, click on the button below.

    Manage my Alerts

    New Citation Alert!

    Please log in to your account

  • Get Access

      • Get Access
      • References
      • Media
      • Tables
      • Share

    Abstract

    The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for a huge number of devices, which indicates the presence of dynamical users join and leave events. Due to highly heterogeneous architecture, it is crucial to address security in 5G HetNets. In this paper, we focus on presenting a mutual physical layer handover authentication approach for software-defined networking (SDN) assisted 5G HetNets. The legitimacy of user equipment (UE) and access points (AP) are both verified based on extracted physical layer characteristics of wireless channel links with the help of base station (BS). Furthermore, a verification is employed to enhance authentication performance. The parameters of are discussed in our simulations and Figure of Merit (FoM) is applied in the simulation to evaluate the performance of proposed authentication scheme.

    References

    [1]

    A. Gupta and R. K. Jha. 2015. A survey of 5G network: architecture and emerging technologies. IEEE ACCESS. Vol. 3 (Jul. 2015), 1206--1232.

    [2]

    Alaa A., Amir E. and Nidal Nasser. 2016. Quality of Service Interworking over Heterogeneous Networks in 5G. 2016. In Proceedings of IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 22--27.

    [3]

    C.-K. Han, H.-K. Choi. 2014. Security analysis of handover key management in 4G LTE/SAE networks. IEEE Trans. Mobile Comput., Vol. 13, No. 2, pp. 457--468.

    Digital Library

    [4]

    J. Cao, M. Ma, H. Li, Y. Zhang and Z. Luo. 2014. A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tut., Vol. 16, No. 1, pp. 283--302.

    [5]

    T. Ma, F. Hu and Maode Ma. 2017. Fast and efficient physical layer authentication for 5G HetNet handover. In Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia, Nov. 2017, pp. 1--3.

    [6]

    Y. Liu, H. Chen and L. Wang. 2017. Physical layer security for next generation wireless networks: Theories technologies and challenges. IEEE Commun. Surv. Tut., vol. 19, no. 1, pp. 347--376.

    Digital Library

    [7]

    J. Zhu, Y. Zou and B. Zheng. 2017. Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access, Vol. 5, pp. 5313--5320.

    [8]

    S. Zeng, X. Li, A. Salem, D. Zhao. 2018. Physical Layer Authentication Based on CFO and Visibility Graph. In Proceedings of 2018 International Conference on Networking and Network Applications (NaNA). Xi'an, China, Oct. 2018, pp. 147--152.

    [9]

    P. Zhang and X. Jiang. 2018. Channel-based Authentication for Dual-Hop Wireless Networks. In Proceedings of 2018 International Conference on Networking and Network Applications (NaNA). Xi'an, China, Oct. 2018, pp. 42--46.

    [10]

    G. Verma, P. Yu and B. M. Sadler. 2015. Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access, Vol. 3, pp. 81--88.

    [11]

    S. Rumpel, A. Wolf and E. A. Jorswieck. 2016. Physical layer based authentication without phase detection. In Proceedings of 50th Asilomar Conference on Signals Systems and Computers. Pacific Grove, CA, USA, Nov 2016, pp. 1675--1679.

    [12]

    J. Yang, X. Ji, K. Huang, Y. Chen, X. Xu and M. Yi.2019. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun., Vol. 13, No. 2, pp. 144--152.

    [13]

    F. Pan, Y. Jiang, H. Wen, R. Liao and A. Xu. 2017. Physical layer security assisted 5G network security. In Proceedings of IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, Sep. 2017, pp. 1--5.

    [14]

    F. J. Liu, X. Wang and S. L. Primak. 2013. A two Dimensional Quantization Algorithm for CIR-Based Physical Layer Authentication. In Proceedings of the IEEE ICC 2013 Signal Processing for Communication Symposium, Budapest, Hungary, Jun. 2013, pp. 4724--4728.

    [15]

    C. Pei, N. Zhang, X.S. Shen and J.W. Mark. 2014. Channel-based physical layer authentication. In Proceedings of the IEEE Global Communication Conference (GLOBECOM), Austin, TX, USA, Dec. 2014, pp. 4114--4119.

    [16]

    Wang T., Liu Y., Vasilakos A.V. 2015. Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Netw., Vol. 21, No. 6, pp.1--12.

    Cited By

    View all

    • Sharma HSharma GKumar N(2024)AI-assisted secure data transmission techniques for next-generation HetNets: A reviewComputer Communications10.1016/j.comcom.2023.12.015215(74-90)Online publication date: Feb-2024
    • Sodhro AAwad ABeek JNikolakopoulos G(2022)Intelligent authentication of 5G healthcare devices: A surveyInternet of Things10.1016/j.iot.2022.10061020(100610)Online publication date: Nov-2022
    • Reus-Muns GJaisinghani DSankhe KChowdhury K(2020)Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR PlatformGLOBECOM 2020 - 2020 IEEE Global Communications Conference10.1109/GLOBECOM42002.2020.9348261(1-6)Online publication date: Dec-2020

    Index Terms

    1. Securing 5G HetNets Using Mutual Physical Layer Authentication

      1. Security and privacy

        1. Security services

          1. Authentication

      Recommendations

      • A new mutual authentication scheme based on nonce and smart cards

        In 2003, Shen, Lin and Hwang proposed a timestamp-based password authentication scheme using smart card. In the scheme the remote server does not need to store the passwords or verification tables for users' authentication, and the scheme also provides ...

        Read More

      • Secure remote user authentication scheme using bilinear pairings

        WISTP'07: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems

        In 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.'s scheme is still vulnerable to an impersonation attack and an off-line password ...

        Read More

      • A non-interactive deniable authentication scheme based on designated verifier proofs

        A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been ...

        Read More

      Comments

      Information & Contributors

      Information

      Published In

      Securing 5G HetNets Using Mutual Physical Layer Authentication | Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City (4)

      ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City

      December 2019

      601 pages

      ISBN:9781450376631

      DOI:10.1145/3377170

      Copyright © 2019 ACM.

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]

      In-Cooperation

      • Shanghai Jiao Tong University: Shanghai Jiao Tong University
      • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
      • University of Malaya: University of Malaya

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 March 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. 5G HetNets
      2. Physical layer authentication
      3. authentication

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICIT 2019

      ICIT 2019: IoT and Smart City

      December 20 - 23, 2019

      Shanghai, China

      Contributors

      Securing 5G HetNets Using Mutual Physical Layer Authentication | Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City (5)

      Other Metrics

      View Article Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 3

        Total Citations

        View Citations
      • 154

        Total Downloads

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)0

      Other Metrics

      View Author Metrics

      Citations

      Cited By

      View all

      • Sharma HSharma GKumar N(2024)AI-assisted secure data transmission techniques for next-generation HetNets: A reviewComputer Communications10.1016/j.comcom.2023.12.015215(74-90)Online publication date: Feb-2024
      • Sodhro AAwad ABeek JNikolakopoulos G(2022)Intelligent authentication of 5G healthcare devices: A surveyInternet of Things10.1016/j.iot.2022.10061020(100610)Online publication date: Nov-2022
      • Reus-Muns GJaisinghani DSankhe KChowdhury K(2020)Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR PlatformGLOBECOM 2020 - 2020 IEEE Global Communications Conference10.1109/GLOBECOM42002.2020.9348261(1-6)Online publication date: Dec-2020

      View Options

      Get Access

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      Get this Publication

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Securing 5G HetNets Using Mutual Physical Layer Authentication | Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City (2024)

      References

      Top Articles
      2017 Audi A7 for sale - Dallas, TX - craigslist
      Who is the most powerful marvel superhero? - Answers
      Pixel Speedrun Unblocked 76
      Compare Foods Wilson Nc
      Directions To Franklin Mills Mall
      Academic Integrity
      Routing Number 041203824
      Craigslist In Fredericksburg
      Rainfall Map Oklahoma
      Becky Hudson Free
      Oriellys St James Mn
      Facebook Marketplace Charlottesville
      Ivegore Machete Mutolation
      Learn2Serve Tabc Answers
      Fear And Hunger 2 Irrational Obelisk
      Billionaire Ken Griffin Doesn’t Like His Portrayal In GameStop Movie ‘Dumb Money,’ So He’s Throwing A Tantrum: Report
      NHS England » Winter and H2 priorities
      Talbots.dayforce.com
      Glenda Mitchell Law Firm: Law Firm Profile
      CVS Near Me | Columbus, NE
      The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
      Best Boston Pizza Places
      Walmart Pharmacy Near Me Open
      Page 2383 – Christianity Today
      Urbfsdreamgirl
      Pensacola Tattoo Studio 2 Reviews
      Skidware Project Mugetsu
      Rural King Credit Card Minimum Credit Score
      FREE Houses! All You Have to Do Is Move Them. - CIRCA Old Houses
      Craigslist Cars And Trucks Mcallen
      Dreamcargiveaways
      Sun-Tattler from Hollywood, Florida
      Where Do They Sell Menudo Near Me
      Tendermeetup Login
      11 Pm Pst
      Craigslist Georgia Homes For Sale By Owner
      Ursula Creed Datasheet
      Compare Plans and Pricing - MEGA
      Craigslist Free Manhattan
      Kornerstone Funeral Tulia
      Why I’m Joining Flipboard
      SF bay area cars & trucks "chevrolet 50" - craigslist
      Other Places to Get Your Steps - Walk Cabarrus
      Mudfin Village Wow
      Unit 11 Homework 3 Area Of Composite Figures
      Who uses the Fandom Wiki anymore?
      Mlb Hitting Streak Record Holder Crossword Clue
      4Chan Zelda Totk
      786 Area Code -Get a Local Phone Number For Miami, Florida
      Mkvcinemas Movies Free Download
      Renfield Showtimes Near Regal The Loop & Rpx
      Dumb Money Showtimes Near Regal Stonecrest At Piper Glen
      Latest Posts
      Article information

      Author: Stevie Stamm

      Last Updated:

      Views: 6425

      Rating: 5 / 5 (80 voted)

      Reviews: 87% of readers found this page helpful

      Author information

      Name: Stevie Stamm

      Birthday: 1996-06-22

      Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

      Phone: +342332224300

      Job: Future Advertising Analyst

      Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

      Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.