Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Abstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2020-05-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s13638-020-01702-8 |
id |
doaj-865285820b6a4189a9ae0a43ba067d5c |
---|---|
record_format |
Article |
spelling |
doaj-865285820b6a4189a9ae0a43ba067d5c2020-11-25T03:23:36ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992020-05-012020113410.1186/s13638-020-01702-8Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksKamal Ali Alezabi0Fazirulhisyam Hashim1Shaiful J. Hashim2Borhanuddin M. Ali3Abbas Jamalipour4Institute of Computer Science and Digital Innovation, UCSI UniversityDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMFaculty of Engineering and Information Technologies, University of SydneyAbstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.http://link.springer.com/article/10.1186/s13638-020-01702-85GEAP-AKA ′ authenticationFast re-authenticationAVISPA |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kamal Ali Alezabi Fazirulhisyam Hashim Shaiful J. Hashim Borhanuddin M. Ali Abbas Jamalipour |
spellingShingle |
Kamal Ali Alezabi Fazirulhisyam Hashim Shaiful J. Hashim Borhanuddin M. Ali Abbas Jamalipour Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks EURASIP Journal on Wireless Communications and Networking 5G EAP-AKA ′ authentication Fast re-authentication AVISPA |
author_facet |
Kamal Ali Alezabi Fazirulhisyam Hashim Shaiful J. Hashim Borhanuddin M. Ali Abbas Jamalipour |
author_sort |
Kamal Ali Alezabi |
title |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks |
title_short |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks |
title_full |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks |
title_fullStr |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks |
title_full_unstemmed |
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks |
title_sort |
efficient authentication and re-authentication protocols for 4g/5g heterogeneous networks |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1499 |
publishDate |
2020-05-01 |
description |
Abstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks. |
topic |
5G EAP-AKA ′ authentication Fast re-authentication AVISPA |
url |
http://link.springer.com/article/10.1186/s13638-020-01702-8 |
work_keys_str_mv |
AT kamalalialezabi efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks AT fazirulhisyamhashim efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks AT shaifuljhashim efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks AT borhanuddinmali efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks AT abbasjamalipour efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks |
_version_ |
1724605512718221312 |