Cryptographic Authentication Protocol for Handover in 5G Mobile Network

Mohamed Said Abdelhady Ibrahim;

Abstract


This chapter introduces attack models and security assessment to the proposed protocol, where, the proposed protocol achieves the mutual authentication between the (UE) and target (BS).
The proposed protocol is secure against the addressed attack models through handover authentication process.
The security assessment on the proposed protocol is conducted using two methods:
• AVISPA validation tool against (MITM) Attack, the attacker has tried to add any new knowledge to his initial knowledge in order to obtain the (TEK) but he could not find a trace of any attack.
MATLAB tool against impersonation attack, the attacker intentionally try to connect to a target (BS) as a legal user after disclosure (TEK).

This process reduced the attackers’ capabilities to attack target (BS) from range 2π to 2π/6 where n is the number of cell edges.


Other data

Title Cryptographic Authentication Protocol for Handover in 5G Mobile Network
Other Titles بروتوكول التوثيق المشفر للتسليم في شبكات الجيل الخامس للهاتف المحمول
Authors Mohamed Said Abdelhady Ibrahim
Issue Date 2020

Attached Files

File SizeFormat
BB316.pdf673.01 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 6 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.