2022
DOI: 10.1109/access.2022.3159686
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

Abstract: With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires each device to act as intelligent transmission relays. Inclusion of such intelligence relays and support of quantum computing at D2D may compromise existing security mechanisms and may lead towards primitive attacks such as impersonation attack, rouge device attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 43 publications
0
7
1
Order By: Relevance
“…Hence, this research will focus on security issues on cell-free architecture for the ultra-dense environment, more specifically it will be dealing with mitigating communication attacks using multifactor authentication scheme assisted with blockchain technology. This research work is the extension of our previous works, where we proposed lightweight multifactor authentication scheme for cellular networks specifically 5G, and trust-based blockchain architecture for VANET, where we mitigate major communication attacks using blockchain technology [12], [13]. In this research work, we enhance our previous security schemes to address security issues in cell free 6G environment by integrating blockchain with lightweight multifactor authentication scheme [14].…”
Section: Introductionmentioning
confidence: 93%
“…Hence, this research will focus on security issues on cell-free architecture for the ultra-dense environment, more specifically it will be dealing with mitigating communication attacks using multifactor authentication scheme assisted with blockchain technology. This research work is the extension of our previous works, where we proposed lightweight multifactor authentication scheme for cellular networks specifically 5G, and trust-based blockchain architecture for VANET, where we mitigate major communication attacks using blockchain technology [12], [13]. In this research work, we enhance our previous security schemes to address security issues in cell free 6G environment by integrating blockchain with lightweight multifactor authentication scheme [14].…”
Section: Introductionmentioning
confidence: 93%
“…This makes it challenging for a mitigation method to differentiate between an attacker and a legitimate user. 18,[34][35][36] An SDN-based system may readily be subjected to a DoS attack by flooding the OpenFlow switch with packets having random destinations. In search of a new flow rule, every packet is now transmitted from the switch to the controller.…”
Section: Problem Statementmentioning
confidence: 99%
“…Network activity includes both of these examples. This makes it challenging for a mitigation method to differentiate between an attacker and a legitimate user 18,34–36 …”
Section: Introductionmentioning
confidence: 99%
“…However, immense technological growth has resulted in a significant expansion of network size, interconnected devices, and the applications and the data handled, thereby has demanded an improvement in the current IDS systems, which have shown inefficiency in detecting new malicious security threats by monitoring the vast network traffic behavior. Hence resulting in a decline in the detection accuracy in detecting security attacks and a rise in the false alarm rate (FAR) and false negative rate (FNR) 12 …”
Section: Introductionmentioning
confidence: 99%
“…Hence resulting in a decline in the detection accuracy in detecting security attacks and a rise in the false alarm rate (FAR) and false negative rate (FNR). 12 Researchers have recently explored integrating IDS with artificial intelligence (AI) methods such as machine learning (ML) and deep learning (DL) to address these issues. ML and DL techniques are extremely powerful tools that have gained significant popularity over the last decade due to the invention of very powerful Graphics Processing Units (GPUs).…”
Section: Introductionmentioning
confidence: 99%