Please use this identifier to cite or link to this item:
|Title:||Secure and efficient authentication schemes for 5G heterogeneous networks||Authors:||Ozhelvaci, Alican||Keywords:||Engineering::Electrical and electronic engineering::Wireless communication systems||Issue Date:||2021||Publisher:||Nanyang Technological University||Source:||Ozhelvaci, A. (2021). Secure and efficient authentication schemes for 5G heterogeneous networks. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/154440||Abstract:||5G is a new paradigm that brings new technologies to overcome the challenges of the next-generation wireless mobile network. Also, 5G is expected to supply the fastest, most reliable mobile network access to support huge data traffic and massively connected nodes with low latency and high throughput. There are different new technologies that are emerging to tackle requirements of the future wireless mobile network, such as Network Function Virtualization (NFV), Software-Defined Networking (SDN), and cloud computing. The heterogeneous environment of 5G will cause frequent handoffs in small cells deployment where users join and leave frequently. Therefore, in this research work, the focus is on secure and seamless authentication mechanisms to supply strong, quick, and mutual authentication. And, careful attention is given to security challenges, therefore, potential pitfalls can be avoided. We will begin by explaining emerging technologies for the 5G mobile network. Then, the architecture of SDN is described in the 5G system. Subsequently, we will explain our proposed fast and efficient handover authentication schemes for next-generation wireless mobile communication - 5G – based on SDN architecture specified in the 3GPP technical standard release 16. Therefore, it can also support non-3GPP access networks too. All designed schemes are verified by security verification methods, we used the SPAN-AVISPA tool to simulate and analyze our proposed scheme and to provide a formal verification, and BAN Logic is used for logical correctness. Comparisons are shown for the proposed schemes with the existing protocol to show the improved security and performance. At last, a summary is drawn for the main contributions of this research work and the possible future works that new investigations should be done on other key areas to improve security features and performance of a security protocol or develop new ways to secure the protocol.||URI:||https://hdl.handle.net/10356/154440||DOI:||10.32657/10356/154440||Rights:||This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0).||Fulltext Permission:||embargo_20231222||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Theses|
Files in This Item:
|2.98 MB||Adobe PDF||Under embargo until Dec 22, 2023|
Updated on Jun 30, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.