2017
DOI: 10.1007/978-3-319-68179-5_43
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Authentication Protocol for 5G Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…5G AKA protocol enhances the AKA protocol of 4G LTE [14] [15] by providing the next party and channel with proof of successful authentication of the UE from the visited network [16]. Idrissi et al [17] proposed enhancement of AKA protocol in order to meet the requirements of authentication and authorization in 5G networks by using a new key framework, which not only improved performance, but also enabled fast re-authentication during handover. Basin et al [18] analyzed the 5G AKA algorithms and demonstrated that the protocol failed in meeting several security goals, which were explicitly required, and then made explicit recommendations for the attacks and weaknesses with finding.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…5G AKA protocol enhances the AKA protocol of 4G LTE [14] [15] by providing the next party and channel with proof of successful authentication of the UE from the visited network [16]. Idrissi et al [17] proposed enhancement of AKA protocol in order to meet the requirements of authentication and authorization in 5G networks by using a new key framework, which not only improved performance, but also enabled fast re-authentication during handover. Basin et al [18] analyzed the 5G AKA algorithms and demonstrated that the protocol failed in meeting several security goals, which were explicitly required, and then made explicit recommendations for the attacks and weaknesses with finding.…”
Section: B Related Workmentioning
confidence: 99%
“…The mean number n ba22 of authentication request loss due to the SEAF entity failure is computed in Eq. (17).…”
Section: A: Number Of Authentication Request Loss Per Failurementioning
confidence: 99%
“…The successful authentication process can ensure that the access to the network is limited to legitimate users only [3]. In recent years, various authentication protocols were proposed [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] based on different cryptographic mechanisms. The schemes [15][16][17][18] are based on lightweight symmetric key primitives, as per the criteria laid down by Wang and Wang [21], the symmetric key mechanisms cannot provide privacy except for keeping a very large number of pseudo identities in smart-card with low memory or getting dynamic identity from home network at each login request.…”
Section: Introductionmentioning
confidence: 99%
“…The schemes [4][5][6][7][12][13][14] based on bilinear pairing/modular exponentiation operations consume much more computation and in turn drains more battery power of already limited power wireless/mobile devices. Some of such schemes [8][9][10][11] are based on public but still low resource sucker Elliptic Curve Cryptography (ECC).…”
Section: Introductionmentioning
confidence: 99%
“…al. [46] proposed an efficient authentication protocol for the 5G heterogeneous network. In the proposal, the existing EAP-AKA protocol is improved by adding Elliptic Curve Diffie-Hellman (ECDH).…”
Section: One-to-one Authentication and Key Agreement (Aka) Schemesmentioning
confidence: 99%