Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4836
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:41Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:41Z-
dc.date.issued2021-
dc.identifier.citationGupta, S., Parne, B. L., Chaudhari, N. S., & Saxena, S. (2021). SEAI: Secrecy and efficiency aware inter-gNB handover authentication and key agreement protocol in 5G communication network. Wireless Personal Communications, doi:10.1007/s11277-021-09036-4en_US
dc.identifier.issn0929-6212-
dc.identifier.otherEID(2-s2.0-85113669946)-
dc.identifier.urihttps://doi.org/10.1007/s11277-021-09036-4-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4836-
dc.description.abstractRecently, the Third Generation Partnership Project (3GPP) has initiated the research in the Fifth Generation (5G) network to fulfill the security characteristics of IoT-based services. 3GPP has proposed the 5G handover key structure and framework in a recently published technical report. In this paper, we evaluate the handover authentication mechanisms reported in the literature and identify the security vulnerabilities such as violation of global base-station attack, failure of key forward/backward secrecy, de-synchronization attack, and huge network congestion. Also, these protocols suffer from high bandwidth consumption that doesn’t suitable for energy-efficient mobile devices in the 5G communication network. To overcome these issues, we introduce Secrecy and Efficiency Aware Inter-gNB (SEAI) handover Authentication and Key Agreement (AKA) protocol. The formal security proof of the protocol is carried out by Random Oracle Model (ROM) to achieve the session key secrecy, confidentiality, and integrity. For the protocol correctness and achieve the mutual authentication, simulation is performed using the AVISPA tool. Also, the informal security evaluation represents that the protocol defeats all the possible attacks and achieves the necessary security properties.Moreover, the performance evaluation of the earlier 5G handover schemes and proposed SEAI handover AKA protocol is carried out in terms of communication, transmission, computation overhead, handover delay, and energy consumption. From the evaluations, it is observed that the SEAI handover AKA protocol obtains significant results and strengthens the security of the 5G network during handover scenarios. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.sourceWireless Personal Communicationsen_US
dc.subject3G mobile communication systemsen_US
dc.subjectAuthenticationen_US
dc.subjectComputer crimeen_US
dc.subjectEnergy efficiencyen_US
dc.subjectEnergy utilizationen_US
dc.subjectInternet protocolsen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectNetwork securityen_US
dc.subjectComputation overheadsen_US
dc.subjectDe-synchronization attacksen_US
dc.subjectHandover authenticationsen_US
dc.subjectMutual authenticationen_US
dc.subjectProtocol correctnessen_US
dc.subjectRandom Oracle modelen_US
dc.subjectSecurity vulnerabilitiesen_US
dc.subjectThird generation partnership project (3GPP)en_US
dc.subject5G mobile communication systemsen_US
dc.titleSEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Networken_US
dc.typeJournal Articleen_US
dc.rights.licenseAll Open Access, Green-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: