Please use this identifier to cite or link to this item:
Title: Secure and efficient authentication schemes for 5G heterogeneous networks
Authors: Ozhelvaci, Alican
Keywords: Engineering::Electrical and electronic engineering::Wireless communication systems
Issue Date: 2021
Publisher: Nanyang Technological University
Source: Ozhelvaci, A. (2021). Secure and efficient authentication schemes for 5G heterogeneous networks. Doctoral thesis, Nanyang Technological University, Singapore.
Abstract: 5G is a new paradigm that brings new technologies to overcome the challenges of the next-generation wireless mobile network. Also, 5G is expected to supply the fastest, most reliable mobile network access to support huge data traffic and massively connected nodes with low latency and high throughput. There are different new technologies that are emerging to tackle requirements of the future wireless mobile network, such as Network Function Virtualization (NFV), Software-Defined Networking (SDN), and cloud computing. The heterogeneous environment of 5G will cause frequent handoffs in small cells deployment where users join and leave frequently. Therefore, in this research work, the focus is on secure and seamless authentication mechanisms to supply strong, quick, and mutual authentication. And, careful attention is given to security challenges, therefore, potential pitfalls can be avoided. We will begin by explaining emerging technologies for the 5G mobile network. Then, the architecture of SDN is described in the 5G system. Subsequently, we will explain our proposed fast and efficient handover authentication schemes for next-generation wireless mobile communication - 5G – based on SDN architecture specified in the 3GPP technical standard release 16. Therefore, it can also support non-3GPP access networks too. All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. Comparisons are shown for the proposed schemes with the existing protocol to show the improved security and performance. At last, a summary is drawn for the main contributions of this research work and the possible future works that new investigations should be done on other key areas to improve security features and performance of a security protocol or develop new ways to secure the protocol.
DOI: 10.32657/10356/154440
Rights: This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0).
Fulltext Permission: embargo_20231222
Fulltext Availability: With Fulltext
Appears in Collections:EEE Theses

Files in This Item:
File Description SizeFormat 
  Until 2023-12-22
2.98 MBAdobe PDFUnder embargo until Dec 22, 2023

Page view(s)

Updated on Jun 30, 2022

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.