4.6 Article

Robust and Universal Seamless Handover Authentication in 5G HetNets

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2927664

Keywords

Handover; Authentication; 5G mobile communication; Servers; Blockchain; 5G; LTE; handover authentication; blockchain; chameleon hashing; BAN logic; AVISPA

Funding

  1. National Key R&D Program of China [2017YFB0802000]
  2. AXA Research Fund
  3. National Natural Science Foundation of China [61772418, 61472472]
  4. Key Research and Development Program of Shaanxi [2019KW-053]
  5. Sichuan Science and Technology Program [2017GZDZX0002]
  6. Natural Science Basic Research Plan in Shaanxi Province of China [2018JZ6001, 2015JQ6236]
  7. New Star Team of Xi'an University of Posts & Telecommunications [2016-02]

Ask authors/readers for more resources

The evolving 5G cellular networks require security and efficiency for frequent handovers, and the RUSH protocol proposed in this paper addresses existing authentication challenges while achieving universality and robustness. RUSH utilizes chameleon hash functions and blockchains to enable anonymous mutual authentication with key agreement, and it has been proven to resist various attacks while outperforming other schemes in both computation and communication efficiency.
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity and densification of 5G heterogeneous networks (HetNets), it is important to ensure security and efficiency of frequent handovers in 5G wireless roaming environments. However, existing handover authentication mechanisms still have challenging issues, such as anonymity, robust traceability and universality. In this paper, we address these issues by introducing RUSH, a Robust and Universal Seamless Handover authentication protocol for 5G HetNets. In RUSH, anonymous mutual authentication with key agreement is enabled for handovers by exploiting the trapdoor collision property of chameleon hash functions and the tamper-resistance of blockchains. RUSH achieves universal handover authentication for all the diverse mobility scenarios, as exemplified by the handover between 5G new radio and non-3GPP access regardless of the trustworthiness of non-3GPP access and the consistency of the core network. RUSH also achieves perfect forward secrecy, master key forward secrecy, known randomness secrecy, key escrow freeness and robust traceability. Our formal security proofs based on the BAN-logic and formal verification based on AVISPA indicate that RUSH resists various attacks. Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available