2021
DOI: 10.1109/access.2021.3107308
|View full text |Cite
|
Sign up to set email alerts
|

A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything

Abstract: Cellular technology has evolved over the decades for mobile network operators to accommodate the ever-growing demands of services for connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These small-cell base stations in 5G-V2X must be strategically deployed near the consumers to realize several use cases. More recently, the architectural split solutions in N… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 19 publications
0
5
0
1
Order By: Relevance
“…Some surveyed papers also propose applying formal methods to enhance trust (regarding security) in 5G networks (e.g., [210,[212][213][214][215]). In this case, one of the challenges is the appropriate choice of how to represent network components, specific components of application scenarios, potential attacks, and mitigation strategies.…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…Some surveyed papers also propose applying formal methods to enhance trust (regarding security) in 5G networks (e.g., [210,[212][213][214][215]). In this case, one of the challenges is the appropriate choice of how to represent network components, specific components of application scenarios, potential attacks, and mitigation strategies.…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…The first phase is responsible for mutual AKA between the UE and gNB-DU, and the second phase secures the link between the UE and gNB-DU. Both phases are achieved via a master key (MSK) and the other keys derived from MSK [69].…”
Section: Nf Placementmentioning
confidence: 99%
“…BAN logic's verification procedure consists of four steps: idealization (modeling the protocol using formal logic), assumption (setting initial realistic security assumptions), goals (defining the security objectives that the protocol is expected to meet), and derivation (deriving the security goals from the rules, assumptions, and intermediate results of the derivation). The BAN logic notations and rules can be found in [18] and [19]. The reader is also referred to Appendices B and C for the notations and rules, respectively.…”
Section: Proposed Protocolmentioning
confidence: 99%