Abstract

Recently, the Third Generation Partnership Project (3GPP) has initiated the research in the Fifth Generation (5G) network to fulfill the security characteristics of IoT-based services. 3GPP has proposed the 5G handover key structure and framework in a recently published technical report. In this paper, we evaluate the handover authentication mechanisms reported in the literature and identify the security vulnerabilities such as violation of global base-station attack, failure of key forward/backward secrecy, de-synchronization attack, and huge network congestion. Also, these protocols suffer from high bandwidth consumption that doesn’t suitable for energy-efficient mobile devices in the 5G communication network. To overcome these issues, we introduce Secrecy and Efficiency Aware Inter-gNB (SEAI) handover Authentication and Key Agreement (AKA) protocol. The formal security proof of the protocol is carried out by Random Oracle Model (ROM) to achieve the session key secrecy, confidentiality, and integrity. For the protocol correctness and achieve the mutual authentication, simulation is performed using the AVISPA tool. Also, the informal security evaluation represents that the protocol defeats all the possible attacks and achieves the necessary security properties.Moreover, the performance evaluation of the earlier 5G handover schemes and proposed SEAI handover AKA protocol is carried out in terms of communication, transmission, computation overhead, handover delay, and energy consumption. From the evaluations, it is observed that the SEAI handover AKA protocol obtains significant results and strengthens the security of the 5G network during handover scenarios.

Highlights

  • With the advancement of IoT-based services and applications, the academicians and researchers of 3GPP have recommended 5G communication technology of the cellular network from the recent past [1,2,3]

  • The 5G inter-gNB handover mechanism needs various request/response message communication rounds with the AMF and Generation (5G) BaseStation Node (gN Bs)/Generation (5G) Base-Station Node (gN Bt) that suffers from handover explosion

  • We introduced the secrecy and efficiency aware inter-gNB handover AKA protocol in 5G communication network to avoid the potential security susceptibilities as key negotiation, DoS & bogus base-station attack, and huge authentication complexity

Read more

Summary

Introduction

With the advancement of IoT-based services and applications, the academicians and researchers of 3GPP have recommended 5G communication technology of the cellular network from the recent past [1,2,3]. User Equipment (UE) may broadcast Non-Access Stratum (NAS) information to core network of 5G for session and mobility administration, that hasn’t been attained in preceding cellular network technologies [5; 6] These attributes associate discrete aspects in the security structure of the 5G handover network. The structure of 5G handover key declines to form KFS if an attacker negotiates an honest basestation In this situation, gN Bt doesn’t provide fresh session keys because of desynchronization. GN Bt doesn’t provide fresh session keys because of desynchronization It exhibits the security deficiencies in the key structure of handover, and attacker can negotiate entire prior keys between gNB and UE. It is recommended to introduce a cost efficient and attack resilient inter-gNB handover protocol in the 5G network

Fundamental Security Properties of Handover Protocol
Core Technical Improvements
Handover Structure of 5G
Existing Methodologies
Security Susceptibilities
De-synchronization Attack
Verification Failure
Proposed SEAI Handover Protocol
Establishment Stage
Handover Initialization Stage
Authentication Stage of Handover
Security Analysis
Participants
Attacker model
Protocol security
Assumption
Security Proof
Correctness of the Protocol
Informal Analysis
Performance Estimation
Computation Overhead
Communication Overhead
Transmission Overhead
Conclusion
A Appendix
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call