Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks

Abstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN...

Full description

Bibliographic Details
Main Authors: Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin M. Ali, Abbas Jamalipour
Format: Article
Language:English
Published: SpringerOpen 2020-05-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
5G
Online Access:http://link.springer.com/article/10.1186/s13638-020-01702-8
id doaj-865285820b6a4189a9ae0a43ba067d5c
record_format Article
spelling doaj-865285820b6a4189a9ae0a43ba067d5c2020-11-25T03:23:36ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992020-05-012020113410.1186/s13638-020-01702-8Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksKamal Ali Alezabi0Fazirulhisyam Hashim1Shaiful J. Hashim2Borhanuddin M. Ali3Abbas Jamalipour4Institute of Computer Science and Digital Innovation, UCSI UniversityDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMDepartment of Computer and Communication Systems Engineering, & Research Centre of Excellence for Wireless and Photonic Networks (WiPNET), Faculty of Engineering, Universiti Putra Malaysia, Malaysia 43400 UPMFaculty of Engineering and Information Technologies, University of SydneyAbstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.http://link.springer.com/article/10.1186/s13638-020-01702-85GEAP-AKA ′ authenticationFast re-authenticationAVISPA
collection DOAJ
language English
format Article
sources DOAJ
author Kamal Ali Alezabi
Fazirulhisyam Hashim
Shaiful J. Hashim
Borhanuddin M. Ali
Abbas Jamalipour
spellingShingle Kamal Ali Alezabi
Fazirulhisyam Hashim
Shaiful J. Hashim
Borhanuddin M. Ali
Abbas Jamalipour
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
EURASIP Journal on Wireless Communications and Networking
5G
EAP-AKA ′ authentication
Fast re-authentication
AVISPA
author_facet Kamal Ali Alezabi
Fazirulhisyam Hashim
Shaiful J. Hashim
Borhanuddin M. Ali
Abbas Jamalipour
author_sort Kamal Ali Alezabi
title Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
title_short Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
title_full Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
title_fullStr Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
title_full_unstemmed Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
title_sort efficient authentication and re-authentication protocols for 4g/5g heterogeneous networks
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1499
publishDate 2020-05-01
description Abstract In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-authentication protocols has been reinvented to provide fast and secure handovers (HO) in the current 4G and the next 5G networks. The proposed authentication protocols can be invoked when the users perform a vertical HO (between different networks) for the first time, whereas the re-authentication protocols can be invoked when the users perform a horizontal HO (within the same network domain). These protocols provide an efficient method to protect user identity and reduce the burden on the authentication server (AS) during the sequential handovers. The results of the analytical model show that the proposed protocols achieve better performance than standard and other protocols. The reduction of handover cost, handover delay, and energy consumption in the proposed protocols reaches up to 22%, 44%, and 17%, respectively. In addition, the verification tools show that the proposed protocols are secure, dependable, and prevent all types of authentication and secrecy attacks.
topic 5G
EAP-AKA ′ authentication
Fast re-authentication
AVISPA
url http://link.springer.com/article/10.1186/s13638-020-01702-8
work_keys_str_mv AT kamalalialezabi efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks
AT fazirulhisyamhashim efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks
AT shaifuljhashim efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks
AT borhanuddinmali efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks
AT abbasjamalipour efficientauthenticationandreauthenticationprotocolsfor4g5gheterogeneousnetworks
_version_ 1724605512718221312