Abstract
In the softwarized fifth generation (5G) networks, authentication protocols are deployed by both the mobile network operators and the third-party service providers to enable secure slice formation at the network side and user validation at the service provider side, respectively. However, the usage of static key-based authentication protocols in 5G networks gives rise to two major problems: (i) network slice topology learning attack during the formation of slice and (ii) exposure of users’ service access behavior to the third-party service providers and device-to-device communication peers. In this article, we propose group anonymous (i) privacy preserving mutual authentication (PPMA) and (ii) privacy preserving one-way authentication (PPOA) protocols to address the aforementioned problems, respectively. We also prove the security of the PPMA and PPOA protocols against the chosen ciphertext attack in the random oracle model. The PPMA and PPOA protocols are implemented using the JPBC library and the computation overhead is measured. For 1024 bits discrete logarithm security, the computation overhead of the PPMA and PPOA protocols is respectively 48.54 and 68.65 percent lower than an existing privacy preserving authentication protocol on an Intel processor. The PPMA and PPOA protocols are generic and can be applied in peer-to-peer authentication scenarios where group anonymity and privacy preservation are considered.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: IEEE Transactions on Dependable and Secure Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.