Cryptographic Authentication Protocol for Handover in 5G Mobile Network
Mohamed Said Abdelhady Ibrahim;
Abstract
This chapter introduces attack models and security assessment to the proposed protocol, where, the proposed protocol achieves the mutual authentication between the (UE) and target (BS).
The proposed protocol is secure against the addressed attack models through handover authentication process.
The security assessment on the proposed protocol is conducted using two methods:
• AVISPA validation tool against (MITM) Attack, the attacker has tried to add any new knowledge to his initial knowledge in order to obtain the (TEK) but he could not find a trace of any attack.
MATLAB tool against impersonation attack, the attacker intentionally try to connect to a target (BS) as a legal user after disclosure (TEK).
This process reduced the attackers’ capabilities to attack target (BS) from range 2π to 2π/6 where n is the number of cell edges.
The proposed protocol is secure against the addressed attack models through handover authentication process.
The security assessment on the proposed protocol is conducted using two methods:
• AVISPA validation tool against (MITM) Attack, the attacker has tried to add any new knowledge to his initial knowledge in order to obtain the (TEK) but he could not find a trace of any attack.
MATLAB tool against impersonation attack, the attacker intentionally try to connect to a target (BS) as a legal user after disclosure (TEK).
This process reduced the attackers’ capabilities to attack target (BS) from range 2π to 2π/6 where n is the number of cell edges.
Other data
| Title | Cryptographic Authentication Protocol for Handover in 5G Mobile Network | Other Titles | بروتوكول التوثيق المشفر للتسليم في شبكات الجيل الخامس للهاتف المحمول | Authors | Mohamed Said Abdelhady Ibrahim | Issue Date | 2020 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.