Detailed Information

Cited 0 time in webofscience Cited 50 time in scopus
Metadata Downloads

Secure and efficient protocol for fast handover in 5G mobile Xhaul networks

Full metadata record
DC Field Value Language
dc.contributor.authorSharma, Vishal-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorLeu, Fang-Yie-
dc.contributor.authorAtiquzzaman, Mohammed-
dc.date.accessioned2021-08-11T12:43:52Z-
dc.date.available2021-08-11T12:43:52Z-
dc.date.issued2018-01-15-
dc.identifier.issn1084-8045-
dc.identifier.issn1095-8592-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/6270-
dc.description.abstractMobile networks are observing an all time increase in the number of users and services. These networks have hit the 5G requisites in no time. Current service providers are aiming at resolving issues of subsisting networks by exploiting the capacity and coverage enhancement features of 5G. With a broad spectrum, it has now become more facile to accommodate an astronomically immense number of devices each having multiple applications authoritatively mandating network accessibility. Despite these advantages, such networks suffer from several issues cognate to smooth operations of fronthaul and backhaul, such as interference management, link reliability, flatness, security and flexibility. Integrating fronthaul and backhaul together as an Xhaul is suggested as one of the efficient solutions for handling these issues. Xhaul forms integrated planes which use heterogeneous switches for high optical transmissions. Despite being efficient, Xhaul links are weak in terms of security. The situations will be more serious, particularly when a massive number of User Equipment (UE) and IoT devices are now connected to it This issue is further raised when the terminal fortifying the fronthaul and backhaul moves leading to the formation of mobile Xhaul network. The current security solutions for WiFi, WiMax, WiBro, 4G/LTE are unable to fortify privacy and perfect forward secrecy in mobile Xhaul network, which is a quandary targeted in this paper. To resolve these issues, a novel key exchange and authentication protocol is proposed, which is capable of securing Xhaul links for a moving terminal in the network. The proposed approach is tested utilizing mobile ground node and drone as moving terminal across multiple hubs. The formal analysis utilizing BAN logic and AVISPA tool slake the security requisites and performance evaluation justifies the efficiency in comparison with the existing solutions.-
dc.format.extent20-
dc.language영어-
dc.language.isoENG-
dc.publisherAcademic Press-
dc.titleSecure and efficient protocol for fast handover in 5G mobile Xhaul networks-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1016/j.jnca.2017.11.004-
dc.identifier.scopusid2-s2.0-85036476388-
dc.identifier.wosid000424075000003-
dc.identifier.bibliographicCitationJournal of Network and Computer Applications, v.102, pp 38 - 57-
dc.citation.titleJournal of Network and Computer Applications-
dc.citation.volume102-
dc.citation.startPage38-
dc.citation.endPage57-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusOPTIMIZATION-
dc.subject.keywordPlusCHALLENGES-
dc.subject.keywordPlusSCENARIOS-
dc.subject.keywordPlusARCHITECTURE-
dc.subject.keywordPlusACCESS-
dc.subject.keywordPlusRADIO-
dc.subject.keywordPlusLTE-
dc.subject.keywordAuthor5G-
dc.subject.keywordAuthorMobile Xhaul-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorHandover-
dc.subject.keywordAuthorIoT-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE