首页> 外文OA文献 >Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
【2h】

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

机译:4G和5G蜂窝网络的安全性:对现有网络的调查   身份验证和隐私保护方案

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This paper presents a comprehensive survey of existing authentication andprivacy-preserving schemes for 4G and 5G cellular networks. We start byproviding an overview of existing surveys that deal with 4G and 5Gcommunications, applications, standardization, and security. Then, we give aclassification of threat models in 4G and 5G cellular networks in fourcategories, including, attacks against privacy, attacks against integrity,attacks against availability, and attacks against authentication. We alsoprovide a classification of countermeasures into three types of categories,including, cryptography methods, humans factors, and intrusion detectionmethods. The countermeasures and informal and formal security analysistechniques used by the authentication and privacy preserving schemes aresummarized in form of tables. Based on the categorization of the authenticationand privacy models, we classify these schemes in seven types, including,handover authentication with privacy, mutual authentication with privacy, RFIDauthentication with privacy, deniable authentication with privacy,authentication with mutual anonymity, authentication and key agreement withprivacy, and three-factor authentication with privacy. In addition, we providea taxonomy and comparison of authentication and privacy-preserving schemes for4G and 5G cellular networks in form of tables. Based on the current survey,several recommendations for further research are discussed at the end of thispaper.
机译:本文对4G和5G蜂窝网络的现有身份验证和隐私保护方案进行了全面的概述。我们首先提供有关4G和5G通信,应用程序,标准化和安全性的现有调查的概述。然后,我们将4G和5G蜂窝网络中的威胁模型分为四个类别,包括对隐私的攻击,对完整性的攻击,对可用性的攻击以及对身份验证的攻击。我们还将对策分为三类,包括加密方法,人为因素和入侵检测方法。认证和隐私保护方案所使用的对策以及非正式和正式的安全分析技术以表格的形式进行了总结。根据身份验证和隐私模型的分类,我们将这些方案分为七种类型,包括:带有隐私的切换身份验证,带有隐私的相互身份验证,带有隐私的RFID身份验证,带有隐私的可拒绝身份验证,带有相互匿名的身份验证,带有身份验证的密钥协议和带有私密性的密钥协议,以及具有隐私权的三要素身份验证。此外,我们以表格的形式提供了4G和5G蜂窝网络的分类和认证与隐私保护方案的比较。基于当前的调查,本文最后讨论了一些进一步研究的建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号