Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4626
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:00Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:00Z-
dc.date.issued2018-
dc.identifier.citationGupta, S., Parne, B. L., & Chaudhari, N. S. (2018). Security vulnerabilities in handover authentication mechanism of 5G network. Paper presented at the ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, 369-374. doi:10.1109/ICSCCC.2018.8703355en_US
dc.identifier.isbn9781538663738-
dc.identifier.otherEID(2-s2.0-85065647325)-
dc.identifier.urihttps://doi.org/10.1109/ICSCCC.2018.8703355-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4626-
dc.description.abstractThe main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions. © 2018 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communicationsen_US
dc.subject5G mobile communication systemsen_US
dc.subjectAuthenticationen_US
dc.subjectComputer crimeen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectQueueing networksen_US
dc.subjectDe-synchronization attacksen_US
dc.subjectHandoveren_US
dc.subjectHandover authenticationsen_US
dc.subjectKey hierarchyen_US
dc.subjectMobile telecommunicationsen_US
dc.subjectSecurity vulnerabilitiesen_US
dc.subjectSecurity weaknessen_US
dc.subjectThird generation partnership project (3GPP)en_US
dc.subjectNetwork securityen_US
dc.titleSecurity Vulnerabilities in Handover Authentication Mechanism of 5G Networken_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: