Skip to main content
Top

2023 | OriginalPaper | Chapter

Packet Replays Prevention Protocol for Secure B5G Networks

Authors : Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar

Published in: Proceedings of Seventh International Congress on Information and Communication Technology

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (IoT) application domains such as smart homes, smart cities and in intelligent transport systems. Massive and private data flows in these ultra-dense networks and hence the need to protect them. As such, the Third-Generation Partnership Project (3GPP) has defined Authentication and Key Agreement (AKA) protocols for secure signaling and packet exchanges in these networks. However, these AKA protocols are susceptible to numerous attacks, such as impersonation and packet replays. This has seen the development of numerous schemes based on techniques such as public key cryptography, biometrics, group signatures and blockchain. Unfortunately, these schemes fail to offer the required levels of security and privacy protection at low execution time, energy and bandwidths. In this paper, a protocol is developed that leverages on the message authentication codes, symmetric cryptography and elliptic curve cryptography. It is shown that the proposed protocol is secure under the Dolev–Yao model. In terms of performance, it exhibited the lowest execution time and has the lowest bandwidth requirements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Choudhary G, Kim J, Sharma V (2018) Security of 5G-mobile backhaul networks: a survey. J Wirel Mob Netw, Ubiquitous Comput, Dependable Appl 9(4):41–70 Choudhary G, Kim J, Sharma V (2018) Security of 5G-mobile backhaul networks: a survey. J Wirel Mob Netw, Ubiquitous Comput, Dependable Appl 9(4):41–70
2.
go back to reference Nyangaresi VO, Rodrigues AJ, Abeka SO (2020) Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks. In: 2020 2nd Global power, energy and communication conference (GPECOM), IEEE, Izmir, Turkey, pp 339–344 Nyangaresi VO, Rodrigues AJ, Abeka SO (2020) Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks. In: 2020 2nd Global power, energy and communication conference (GPECOM), IEEE, Izmir, Turkey, pp 339–344
3.
go back to reference Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT), IEEE, pp 189–194 Haddad Z, Fouda MM, Mahmoud M, Abdallah M (2020) Blockchain-based authentication for 5G networks. In: 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT), IEEE, pp 189–194
4.
go back to reference Li G, Lai C (2020) Platoon handover authentication in 5G-V2X: IEEE CNS 20 poster. In: 2020 IEEE conference on communications and network security (CNS), IEEE, 1–2 Li G, Lai C (2020) Platoon handover authentication in 5G-V2X: IEEE CNS 20 poster. In: 2020 IEEE conference on communications and network security (CNS), IEEE, 1–2
5.
go back to reference Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096–28108 Wu TY, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen CM (2020) An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access 8:28096–28108
6.
go back to reference Nyangaresi VO, Rodrigues AJ, Abeka SO (2020) Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International computer engineering conference (ICENCO), 25–30, IEEE, Cairo, Egypt Nyangaresi VO, Rodrigues AJ, Abeka SO (2020) Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International computer engineering conference (ICENCO), 25–30, IEEE, Cairo, Egypt
7.
go back to reference Zhang Z, Zhang W, Qin Z, Hu S, Qian Z, Chen X (2021) A secure channel established by the PF-CL-AKA protocol with two-way ID-based authentication in advance for the 5G-based wireless mobile network. In: 2021 IEEE Asia conference on information engineering (ACIE), IEEE, 11–15 Zhang Z, Zhang W, Qin Z, Hu S, Qian Z, Chen X (2021) A secure channel established by the PF-CL-AKA protocol with two-way ID-based authentication in advance for the 5G-based wireless mobile network. In: 2021 IEEE Asia conference on information engineering (ACIE), IEEE, 11–15
8.
go back to reference Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE access 8:67555–67571 Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE access 8:67555–67571
9.
go back to reference Nyangaresi VO (2021) Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, IEEE, 1–6 Nyangaresi VO (2021) Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, IEEE, 1–6
10.
go back to reference Ouaissa M, Houmer M, Ouaissa M (2020) An enhanced authentication protocol based group for vehicular communications over 5G networks. In: 2020 3rd International conference on advanced communication technologies and networking (CommNet), IEEE, 1–8 Ouaissa M, Houmer M, Ouaissa M (2020) An enhanced authentication protocol based group for vehicular communications over 5G networks. In: 2020 3rd International conference on advanced communication technologies and networking (CommNet), IEEE, 1–8
11.
go back to reference Nyangaresi VO, Rodrigues AJ, Abeka SO (2021) ANN-FL secure handover protocol for 5G and beyond networks. In: Zitouni R, Phokeer A, Chavula J, Elmokashfi A, Gueye A, Benamar N (eds) Towards new e-Infrastructure and e-Services for developing countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 361. Springer, Cham Nyangaresi VO, Rodrigues AJ, Abeka SO (2021) ANN-FL secure handover protocol for 5G and beyond networks. In: Zitouni R, Phokeer A, Chavula J, Elmokashfi A, Gueye A, Benamar N (eds) Towards new e-Infrastructure and e-Services for developing countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 361. Springer, Cham
12.
go back to reference Fang D, Qian Y (2020) 5G wireless security and privacy: Architecture and flexible mechanisms. IEEE Veh Technol Mag 15(2):58–64 Fang D, Qian Y (2020) 5G wireless security and privacy: Architecture and flexible mechanisms. IEEE Veh Technol Mag 15(2):58–64
13.
go back to reference Fang H, Wang X, Tomasin S (2019) Machine learning for intelligent authentication in 5G and beyond wireless networks. IEEE Wirel Commun 26(5):55–61 Fang H, Wang X, Tomasin S (2019) Machine learning for intelligent authentication in 5G and beyond wireless networks. IEEE Wirel Commun 26(5):55–61
14.
go back to reference Benzaid C, Taleb T (2020) AI for beyond 5G networks: a cyber-security defense or offense enabler? IEEE Network 34(6):140–147 Benzaid C, Taleb T (2020) AI for beyond 5G networks: a cyber-security defense or offense enabler? IEEE Network 34(6):140–147
15.
go back to reference Nyangaresi VO (2021) ECC based authentication scheme for smart homes. In: 2021 International symposium ELMAR, IEEE, 5–10 Nyangaresi VO (2021) ECC based authentication scheme for smart homes. In: 2021 International symposium ELMAR, IEEE, 5–10
16.
go back to reference Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052 Braeken A, Liyanage M, Kumar P, Murphy J (2019) Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks. IEEE Access 7:64040–64052
17.
go back to reference Koutsos A (2019) The 5G-AKA authentication protocol privacy. In: 2019 IEEE European symposium on security and privacy (EuroS&P), pp 464–479 Koutsos A (2019) The 5G-AKA authentication protocol privacy. In: 2019 IEEE European symposium on security and privacy (EuroS&P), pp 464–479
18.
go back to reference Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Network 34(3):170–177 Refaey A, Hammad K, Magierowski S, Hossain E (2020) A blockchain policy and charging control framework for roaming in cellular networks. IEEE Network 34(3):170–177
19.
go back to reference Rivera AV, Refaey A, Hossain E A blockchain framework for secure task sharing in multi-access edge computing. IEEE Netw 35(3):176–183 Rivera AV, Refaey A, Hossain E A blockchain framework for secure task sharing in multi-access edge computing. IEEE Netw 35(3):176–183
20.
go back to reference Nyangaresi VO, Petrovic N (2021) Efficient PUF based authentication protocol for Internet of drones. In: 2021 International telecommunications conference (ITC-Egypt), IEEE, 1–4 Nyangaresi VO, Petrovic N (2021) Efficient PUF based authentication protocol for Internet of drones. In: 2021 International telecommunications conference (ITC-Egypt), IEEE, 1–4
21.
go back to reference Chen M, Tan C, Zhu X, Zhang X (2020) A blockchain-based authentication and service provision scheme for Intemet of Things. In: 2020 IEEE globecom workshops (GC Wkshps), IEEE, 1–6 Chen M, Tan C, Zhu X, Zhang X (2020) A blockchain-based authentication and service provision scheme for Intemet of Things. In: 2020 IEEE globecom workshops (GC Wkshps), IEEE, 1–6
22.
go back to reference Gharsallah I, Smaoui S, Zarai, F (2019) A secure efficient and lightweight authentication protocol for 5G cellular networks: Sel-aka. In: 2019 15th international wireless communications mobile computing conference (IWCMC), pp 1311–1316 Gharsallah I, Smaoui S, Zarai, F (2019) A secure efficient and lightweight authentication protocol for 5G cellular networks: Sel-aka. In: 2019 15th international wireless communications mobile computing conference (IWCMC), pp 1311–1316
23.
go back to reference Haddad Z, Mahmoud M, Taha S, Saroit IA (2015) Secure and privacy-preserving ami-utility communications via lte-a networks. In: 2015 IEEE 11th international conference on wireless and mobile computing, networking and communications (WiMob), IEEE, pp 748–755 Haddad Z, Mahmoud M, Taha S, Saroit IA (2015) Secure and privacy-preserving ami-utility communications via lte-a networks. In: 2015 IEEE 11th international conference on wireless and mobile computing, networking and communications (WiMob), IEEE, pp 748–755
24.
go back to reference Zhou J (2015) A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification. Journal of Communications 10(2):117–123 Zhou J (2015) A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification. Journal of Communications 10(2):117–123
25.
go back to reference Nyangaresi VO, Mohammad Z (2021) Privacy preservation protocol for smart grid networks. In: 2021 International telecommunications conference (ITC-Egypt), IEEE, 1–4 Nyangaresi VO, Mohammad Z (2021) Privacy preservation protocol for smart grid networks. In: 2021 International telecommunications conference (ITC-Egypt), IEEE, 1–4
26.
go back to reference Hsu R, Lee J, Quek TQS, Chen J (2018) Graad: Group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf Forensics Secur 13(2):449–464 Hsu R, Lee J, Quek TQS, Chen J (2018) Graad: Group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf Forensics Secur 13(2):449–464
27.
go back to reference Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for d2d group communications. IEEE Trans Industr Inf 14(8):3637–3647 Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for d2d group communications. IEEE Trans Industr Inf 14(8):3637–3647
28.
go back to reference Nyangaresi VO, Rodrigues AJ, Taha NK (2021) Mutual authentication protocol for secure VANET data exchanges. In: International conference on future access enablers of Ubiquitous and intelligent infrastructures, Springer, Cham, pp 58–76 Nyangaresi VO, Rodrigues AJ, Taha NK (2021) Mutual authentication protocol for secure VANET data exchanges. In: International conference on future access enablers of Ubiquitous and intelligent infrastructures, Springer, Cham, pp 58–76
29.
go back to reference Liu F, Peng J, Zuo M (2018) Toward a secure access to 5G network. In: 2018 17th IEEE international conference on trust, security and privacy In computing and communications/ 12th IEEE international conference On Big Data science and engineering (TrustCom/BigDataSE), IEEE, pp 1121–1128 Liu F, Peng J, Zuo M (2018) Toward a secure access to 5G network. In: 2018 17th IEEE international conference on trust, security and privacy In computing and communications/ 12th IEEE international conference On Big Data science and engineering (TrustCom/BigDataSE), IEEE, pp 1121–1128
30.
go back to reference Wong AMK, Hsu CL, Le TV, Hsieh MC, Lin TW (2020) Three factor fast authentication scheme with time bound and user anonymity for multi-server E-health systems in 5G-based wireless sensor networks. Sensors 20(9):2511 Wong AMK, Hsu CL, Le TV, Hsieh MC, Lin TW (2020) Three factor fast authentication scheme with time bound and user anonymity for multi-server E-health systems in 5G-based wireless sensor networks. Sensors 20(9):2511
31.
go back to reference Le TV, Hsu CL (2021) An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments. IEEE Access 9:53408–53422 Le TV, Hsu CL (2021) An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments. IEEE Access 9:53408–53422
32.
go back to reference Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: An explanation of the security situations for Internet-of-Things-enabled devices. IEEE Consumer Electronics Magazine 7(6):38–44 Wu F, Li X, Xu L, Sangaiah AK, Rodrigues JJ (2018) Authentication protocol for distributed cloud computing: An explanation of the security situations for Internet-of-Things-enabled devices. IEEE Consumer Electronics Magazine 7(6):38–44
33.
go back to reference Sahay R, Blanc G, Zhang Z, Debar H (2017) ArOMA: An SDN based autonomic DDoS mitigation framework. Comput Secur 70:482–499 Sahay R, Blanc G, Zhang Z, Debar H (2017) ArOMA: An SDN based autonomic DDoS mitigation framework. Comput Secur 70:482–499
34.
go back to reference Bawany NZ, Shamsi JA(2019) SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. J Netw Comput Appl 145:102381 Bawany NZ, Shamsi JA(2019) SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. J Netw Comput Appl 145:102381
35.
go back to reference Xue K, Meng W, Zhou H, Wei DS, Guizani M (2020) A lightweight and secure group key based handover authentication protocol for the software-defined space information network. IEEE Trans Wireless Commun 19(6):3673–3684 Xue K, Meng W, Zhou H, Wei DS, Guizani M (2020) A lightweight and secure group key based handover authentication protocol for the software-defined space information network. IEEE Trans Wireless Commun 19(6):3673–3684
Metadata
Title
Packet Replays Prevention Protocol for Secure B5G Networks
Authors
Vincent Omollo Nyangaresi
Junchao Ma
Mustafa A. Al Sibahee
Zaid Ameen Abduljabbar
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1610-6_44