Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4626
Title: Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Authors: Chaudhari, Narendra S.
Keywords: 5G mobile communication systems;Authentication;Computer crime;Mobile telecommunication systems;Queueing networks;De-synchronization attacks;Handover;Handover authentications;Key hierarchy;Mobile telecommunications;Security vulnerabilities;Security weakness;Third generation partnership project (3GPP);Network security
Issue Date: 2018
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Gupta, S., Parne, B. L., & Chaudhari, N. S. (2018). Security vulnerabilities in handover authentication mechanism of 5G network. Paper presented at the ICSCCC 2018 - 1st International Conference on Secure Cyber Computing and Communications, 369-374. doi:10.1109/ICSCCC.2018.8703355
Abstract: The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions. © 2018 IEEE.
URI: https://doi.org/10.1109/ICSCCC.2018.8703355
https://dspace.iiti.ac.in/handle/123456789/4626
ISBN: 9781538663738
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: