...
首页> 外文期刊>Eurasip Journal on Wireless Communications and Networking >5G wireless P2MP backhaul security protocol: an adaptive approach
【24h】

5G wireless P2MP backhaul security protocol: an adaptive approach

机译:5G无线P2MP回程安全协议:自适应方法

获取原文

摘要

Abstract 5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates. Such diverse and perplexing network requirements bring numerous issues, among which security stands in the first row. The backhaul, which can be implemented as a wired or wireless solution, serves as a bridge between the radio access and core networks assuring connectivity to end users. The recent trends in backhaul usage rely on wireless technologies implemented using point-to-point (PTP) or point-to-multipoint (P2MP) configurations. Unfortunately, due to the nature of the transmission medium, the wireless backhaul is vulnerable and exposed to more various security threats and attacks than the wired one. In order to protect the backhaul, there have been several researches, whose authentication and key exchange scheme mainly depends on the existing security standards such as transport layer security (TLS), Internet Key Exchange version 1 (IKEv1), IKEv2, Host Identity Protocol (HIP), and Authentication and Key Agreement (AKA). However, such security standards cannot completely fulfil the security requirements including security policy update, key update, and balancing between security and efficiency, which are necessary for the emerging 5G networks. This is basically the motive behind why we study and propose a new security protocol for the backhaul link of wireless access network based on P2MP model. The proposed protocol is designed to be 5G-aware, and provides mutual authentication, perfect forward secrecy, confidentiality, integrity, secure key exchange, security policy update, key update, and balancing trade-off between efficiency and security while preventing resource exhaustion attacks. The protocol’s correctness is formally verified by the well-known formal security analysis tools: BAN-logic and Scyther. Moreover, the derived lemmas prove that the security requirements are satisfied. Finally, from a comparison analysis, it is shown that the proposed protocol is better than other standard protocols.
机译:摘要5G为新的服务和技术推出了各种新兴的需求,以便为服务质量,延迟,切换和数据速率提高了栏的新服务和技术。这种多样化和令人困惑的网络需求带来了众多问题,其中安全站在第一行中。可以实现为有线或无线解决方案的回程用作无线电接入和核心网络之间的桥梁,确保与最终用户的连接。近期回程使用趋势依赖于使用点对点(PTP)或点对多点(P2MP)配置实现的无线技术。遗憾的是,由于传输介质的性质,无线回程易受攻击并暴露于比有线的威胁和攻击更多。为了保护回程,已经有几项研究,其认证和密钥交换方案主要取决于现有的安全标准,如传输层安全性(TLS),Internet密钥交换版本1(IKEv1),IKEv2,主机标识协议( HIP),以及身份验证和关键协议(AKA)。但是,此类安全标准不能完全符合安全策略更新,密钥更新和安全性和效率之间的平衡,这些安全标准在新兴的5G网络中是必要的。这基本上是我们研究和提出基于P2MP模型的无线接入网络的回程链路的新安全协议的动机。该协议旨在为5G感知,并提供相互认证,完善的秘密保密,完整性,安全密钥交换,安全策略更新,关键更新和平衡效率和安全性之间的平衡权衡,同时防止资源耗尽攻击。协议的正确性由众所周知的正式安全分析工具正式验证:禁令逻辑和痉挛。此外,衍生的lemmas证明了安全要求满足。最后,从比较分析,显示所提出的协议优于其他标准协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号