2021
DOI: 10.1016/j.jnca.2021.103204
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight and secure handover authentication scheme for 5G network using neighbour base stations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…Considerations on Trust and Communications in Mobile Network. Other considerations of communication complexity in mobile networks (e.g., [30,25]) are generally not systematic, not even coarsely so like ours.…”
Section: Related Workmentioning
confidence: 70%
See 1 more Smart Citation
“…Considerations on Trust and Communications in Mobile Network. Other considerations of communication complexity in mobile networks (e.g., [30,25]) are generally not systematic, not even coarsely so like ours.…”
Section: Related Workmentioning
confidence: 70%
“…General Analyses of Non-XN/N2 Handovers or other 5G Procedures. [30] carry out a Dolev-Yao verification, in the Scyther tool [20], of their "home-made" protocol called the Lightweight and Secure Handover Authentication Scheme (LSHA), based on intra-RAN authentication in handovers. Other such ad-hoc extensions of handovers may exist, but since they are far from "standard" handovers, we do not cover them further here.…”
Section: Related Workmentioning
confidence: 99%
“…Advantages Drawbacks [20] Group Authentication Prevention of DoS using timestamp Weak DDoS prevention for individual authentication [21] Efficient group-based authentication [22] Computation Pool Fault-tolerant 5G-AKA authentication 5G-AKA is inherently vulnerable to DoS attacks [23] One-to-One Authentication…”
Section: Methodsmentioning
confidence: 99%
“…Additionally, the bandwidth in the AUSF pool is still finite and expensive, and thus needs more investment. Yan et al [23] have proposed a lightweight and secure handover authentication scheme based on a prediction of the potential target gNB from all neighbor gNBs in the 5G wireless network. The proposal facilitates fast 5G handover authentication by using time-to-live (TTL) attributes and encrypting the next hop chaining counter (NCC) with the Chinese remainder theorem.…”
Section: Aka Schemes Against Dos and Ddos Attacksmentioning
confidence: 99%
“…The 5G networks possess increased capacities and data rates recommended over applications, including mobile banking and the Internet of Things (IoT) [1]. The 5G cellular technology intends to realize the next generation network where the devices, machines and objects employ together [2,3].…”
Section: Introductionmentioning
confidence: 99%