research-article
Authors: Ting Ma, Feng Hu, and Maode Ma
ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
December 2019
Pages 275 - 278
Published: 20 March 2020 Publication History
- 3citation
- 154
- Downloads
Metrics
Total Citations3Total Downloads154Last 12 Months14
Last 6 weeks0
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
Get Access
- Get Access
- References
- Media
- Tables
- Share
Abstract
The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for a huge number of devices, which indicates the presence of dynamical users join and leave events. Due to highly heterogeneous architecture, it is crucial to address security in 5G HetNets. In this paper, we focus on presenting a mutual physical layer handover authentication approach for software-defined networking (SDN) assisted 5G HetNets. The legitimacy of user equipment (UE) and access points (AP) are both verified based on extracted physical layer characteristics of wireless channel links with the help of base station (BS). Furthermore, a verification is employed to enhance authentication performance. The parameters of are discussed in our simulations and Figure of Merit (FoM) is applied in the simulation to evaluate the performance of proposed authentication scheme.
References
[1]
A. Gupta and R. K. Jha. 2015. A survey of 5G network: architecture and emerging technologies. IEEE ACCESS. Vol. 3 (Jul. 2015), 1206--1232.
[2]
Alaa A., Amir E. and Nidal Nasser. 2016. Quality of Service Interworking over Heterogeneous Networks in 5G. 2016. In Proceedings of IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016, pp. 22--27.
[3]
C.-K. Han, H.-K. Choi. 2014. Security analysis of handover key management in 4G LTE/SAE networks. IEEE Trans. Mobile Comput., Vol. 13, No. 2, pp. 457--468.
Digital Library
[4]
J. Cao, M. Ma, H. Li, Y. Zhang and Z. Luo. 2014. A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tut., Vol. 16, No. 1, pp. 283--302.
[5]
T. Ma, F. Hu and Maode Ma. 2017. Fast and efficient physical layer authentication for 5G HetNet handover. In Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia, Nov. 2017, pp. 1--3.
[6]
Y. Liu, H. Chen and L. Wang. 2017. Physical layer security for next generation wireless networks: Theories technologies and challenges. IEEE Commun. Surv. Tut., vol. 19, no. 1, pp. 347--376.
Digital Library
[7]
J. Zhu, Y. Zou and B. Zheng. 2017. Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access, Vol. 5, pp. 5313--5320.
[8]
S. Zeng, X. Li, A. Salem, D. Zhao. 2018. Physical Layer Authentication Based on CFO and Visibility Graph. In Proceedings of 2018 International Conference on Networking and Network Applications (NaNA). Xi'an, China, Oct. 2018, pp. 147--152.
[9]
P. Zhang and X. Jiang. 2018. Channel-based Authentication for Dual-Hop Wireless Networks. In Proceedings of 2018 International Conference on Networking and Network Applications (NaNA). Xi'an, China, Oct. 2018, pp. 42--46.
[10]
G. Verma, P. Yu and B. M. Sadler. 2015. Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access, Vol. 3, pp. 81--88.
[11]
S. Rumpel, A. Wolf and E. A. Jorswieck. 2016. Physical layer based authentication without phase detection. In Proceedings of 50th Asilomar Conference on Signals Systems and Computers. Pacific Grove, CA, USA, Nov 2016, pp. 1675--1679.
[12]
J. Yang, X. Ji, K. Huang, Y. Chen, X. Xu and M. Yi.2019. Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun., Vol. 13, No. 2, pp. 144--152.
[13]
F. Pan, Y. Jiang, H. Wen, R. Liao and A. Xu. 2017. Physical layer security assisted 5G network security. In Proceedings of IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, Sep. 2017, pp. 1--5.
[14]
F. J. Liu, X. Wang and S. L. Primak. 2013. A two Dimensional Quantization Algorithm for CIR-Based Physical Layer Authentication. In Proceedings of the IEEE ICC 2013 Signal Processing for Communication Symposium, Budapest, Hungary, Jun. 2013, pp. 4724--4728.
[15]
C. Pei, N. Zhang, X.S. Shen and J.W. Mark. 2014. Channel-based physical layer authentication. In Proceedings of the IEEE Global Communication Conference (GLOBECOM), Austin, TX, USA, Dec. 2014, pp. 4114--4119.
[16]
Wang T., Liu Y., Vasilakos A.V. 2015. Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Netw., Vol. 21, No. 6, pp.1--12.
Cited By
View all
- Sharma HSharma GKumar N(2024)AI-assisted secure data transmission techniques for next-generation HetNets: A reviewComputer Communications10.1016/j.comcom.2023.12.015215(74-90)Online publication date: Feb-2024
- Sodhro AAwad ABeek JNikolakopoulos G(2022)Intelligent authentication of 5G healthcare devices: A surveyInternet of Things10.1016/j.iot.2022.10061020(100610)Online publication date: Nov-2022
- Reus-Muns GJaisinghani DSankhe KChowdhury K(2020)Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR PlatformGLOBECOM 2020 - 2020 IEEE Global Communications Conference10.1109/GLOBECOM42002.2020.9348261(1-6)Online publication date: Dec-2020
Index Terms
Securing 5G HetNets Using Mutual Physical Layer Authentication
Security and privacy
Security services
Authentication
Recommendations
- A new mutual authentication scheme based on nonce and smart cards
In 2003, Shen, Lin and Hwang proposed a timestamp-based password authentication scheme using smart card. In the scheme the remote server does not need to store the passwords or verification tables for users' authentication, and the scheme also provides ...
Read More
- Secure remote user authentication scheme using bilinear pairings
WISTP'07: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
In 2006, Das et al. proposed a remote user authentication scheme using the properties of bilinear pairings. The current paper, however, demonstrates that Das et al.'s scheme is still vulnerable to an impersonation attack and an off-line password ...
Read More
- A non-interactive deniable authentication scheme based on designated verifier proofs
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been ...
Read More
Comments
Information & Contributors
Information
Published In
ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
December 2019
601 pages
ISBN:9781450376631
DOI:10.1145/3377170
Copyright © 2019 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected]
In-Cooperation
- Shanghai Jiao Tong University: Shanghai Jiao Tong University
- The Hong Kong Polytechnic: The Hong Kong Polytechnic University
- University of Malaya: University of Malaya
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 20 March 2020
Permissions
Request permissions for this article.
Check for updates
Author Tags
- 5G HetNets
- Physical layer authentication
- authentication
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
ICIT 2019
Contributors
Other Metrics
View Article Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
3
Total Citations
154
Total Downloads
- Downloads (Last 12 months)14
- Downloads (Last 6 weeks)0
Other Metrics
View Author Metrics
Citations
Cited By
View all
- Sharma HSharma GKumar N(2024)AI-assisted secure data transmission techniques for next-generation HetNets: A reviewComputer Communications10.1016/j.comcom.2023.12.015215(74-90)Online publication date: Feb-2024
- Sodhro AAwad ABeek JNikolakopoulos G(2022)Intelligent authentication of 5G healthcare devices: A surveyInternet of Things10.1016/j.iot.2022.10061020(100610)Online publication date: Nov-2022
- Reus-Muns GJaisinghani DSankhe KChowdhury K(2020)Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR PlatformGLOBECOM 2020 - 2020 IEEE Global Communications Conference10.1109/GLOBECOM42002.2020.9348261(1-6)Online publication date: Dec-2020
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderMedia
Figures
Other
Tables