Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/154440
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOzhelvaci, Alicanen_US
dc.date.accessioned2022-01-03T03:19:06Z-
dc.date.available2022-01-03T03:19:06Z-
dc.date.issued2021-
dc.identifier.citationOzhelvaci, A. (2021). Secure and efficient authentication schemes for 5G heterogeneous networks. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/154440en_US
dc.identifier.urihttps://hdl.handle.net/10356/154440-
dc.description.abstract5G is a new paradigm that brings new technologies to overcome the challenges of the next-generation wireless mobile network. Also, 5G is expected to supply the fastest, most reliable mobile network access to support huge data traffic and massively connected nodes with low latency and high throughput. There are different new technologies that are emerging to tackle requirements of the future wireless mobile network, such as Network Function Virtualization (NFV), Software-Defined Networking (SDN), and cloud computing. The heterogeneous environment of 5G will cause frequent handoffs in small cells deployment where users join and leave frequently. Therefore, in this research work, the focus is on secure and seamless authentication mechanisms to supply strong, quick, and mutual authentication. And, careful attention is given to security challenges, therefore, potential pitfalls can be avoided. We will begin by explaining emerging technologies for the 5G mobile network. Then, the architecture of SDN is described in the 5G system. Subsequently, we will explain our proposed fast and efficient handover authentication schemes for next-generation wireless mobile communication - 5G – based on SDN architecture specified in the 3GPP technical standard release 16. Therefore, it can also support non-3GPP access networks too. All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. Comparisons are shown for the proposed schemes with the existing protocol to show the improved security and performance. At last, a summary is drawn for the main contributions of this research work and the possible future works that new investigations should be done on other key areas to improve security features and performance of a security protocol or develop new ways to secure the protocol.en_US
dc.language.isoenen_US
dc.publisherNanyang Technological Universityen_US
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0).en_US
dc.subjectEngineering::Electrical and electronic engineering::Wireless communication systemsen_US
dc.titleSecure and efficient authentication schemes for 5G heterogeneous networksen_US
dc.typeThesis-Doctor of Philosophyen_US
dc.contributor.supervisorSu Rongen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeDoctor of Philosophyen_US
dc.identifier.doi10.32657/10356/154440-
dc.contributor.supervisoremailRSu@ntu.edu.sgen_US
item.fulltextWith Fulltext-
item.grantfulltextembargo_20231222-
Appears in Collections:EEE Theses
Files in This Item:
File Description SizeFormat 
Thesis_Alican-Ozhelvaci-Watermarked.pdf
  Until 2023-12-22
2.98 MBAdobe PDFUnder embargo until Dec 22, 2023

Page view(s)

68
Updated on Jul 4, 2022

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.