2021
DOI: 10.1155/2021/6694058
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network

Abstract: In a 5G network-sliced environment, mobility management introduces a new form of handover called inter-slice handover among network slices. Users can change their slices as their preferences or requirements vary over time. However, existing handover-authentication mechanisms cannot support inter-slice handover because of the fine-grained demand among network slice services, which could cause challenging issues, such as the compromise of service quality, anonymity, and universality. In this paper, we address th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…The 3GPP standards allow advanced long-term evolution (LTE-A) in 5G networks to communicate with other wireless networks, resulting in improved coverage, cost, and efficiency [1][2][3][4][5]. The delay and expense caused by authentication protocols are minimized to provide smooth and quick handovers in heterogeneous networks [6,7]. Authentication protocols should also be protected from authentication attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The 3GPP standards allow advanced long-term evolution (LTE-A) in 5G networks to communicate with other wireless networks, resulting in improved coverage, cost, and efficiency [1][2][3][4][5]. The delay and expense caused by authentication protocols are minimized to provide smooth and quick handovers in heterogeneous networks [6,7]. Authentication protocols should also be protected from authentication attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The emergence of sensor devices, data exchange, sharing, sensing and analysis of gathered data to render enhanced facilities are gaining high priorities towards daily life activities. As highly sensitive data are exchanged in several applications, privacy and security schemes are necessary for deployments [4].…”
Section: Introductionmentioning
confidence: 99%