Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Vishal | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Leu, Fang-Yie | - |
dc.contributor.author | Atiquzzaman, Mohammed | - |
dc.date.accessioned | 2021-08-11T12:43:52Z | - |
dc.date.available | 2021-08-11T12:43:52Z | - |
dc.date.issued | 2018-01-15 | - |
dc.identifier.issn | 1084-8045 | - |
dc.identifier.issn | 1095-8592 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/6270 | - |
dc.description.abstract | Mobile networks are observing an all time increase in the number of users and services. These networks have hit the 5G requisites in no time. Current service providers are aiming at resolving issues of subsisting networks by exploiting the capacity and coverage enhancement features of 5G. With a broad spectrum, it has now become more facile to accommodate an astronomically immense number of devices each having multiple applications authoritatively mandating network accessibility. Despite these advantages, such networks suffer from several issues cognate to smooth operations of fronthaul and backhaul, such as interference management, link reliability, flatness, security and flexibility. Integrating fronthaul and backhaul together as an Xhaul is suggested as one of the efficient solutions for handling these issues. Xhaul forms integrated planes which use heterogeneous switches for high optical transmissions. Despite being efficient, Xhaul links are weak in terms of security. The situations will be more serious, particularly when a massive number of User Equipment (UE) and IoT devices are now connected to it This issue is further raised when the terminal fortifying the fronthaul and backhaul moves leading to the formation of mobile Xhaul network. The current security solutions for WiFi, WiMax, WiBro, 4G/LTE are unable to fortify privacy and perfect forward secrecy in mobile Xhaul network, which is a quandary targeted in this paper. To resolve these issues, a novel key exchange and authentication protocol is proposed, which is capable of securing Xhaul links for a moving terminal in the network. The proposed approach is tested utilizing mobile ground node and drone as moving terminal across multiple hubs. The formal analysis utilizing BAN logic and AVISPA tool slake the security requisites and performance evaluation justifies the efficiency in comparison with the existing solutions. | - |
dc.format.extent | 20 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Academic Press | - |
dc.title | Secure and efficient protocol for fast handover in 5G mobile Xhaul networks | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1016/j.jnca.2017.11.004 | - |
dc.identifier.scopusid | 2-s2.0-85036476388 | - |
dc.identifier.wosid | 000424075000003 | - |
dc.identifier.bibliographicCitation | Journal of Network and Computer Applications, v.102, pp 38 - 57 | - |
dc.citation.title | Journal of Network and Computer Applications | - |
dc.citation.volume | 102 | - |
dc.citation.startPage | 38 | - |
dc.citation.endPage | 57 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | OPTIMIZATION | - |
dc.subject.keywordPlus | CHALLENGES | - |
dc.subject.keywordPlus | SCENARIOS | - |
dc.subject.keywordPlus | ARCHITECTURE | - |
dc.subject.keywordPlus | ACCESS | - |
dc.subject.keywordPlus | RADIO | - |
dc.subject.keywordPlus | LTE | - |
dc.subject.keywordAuthor | 5G | - |
dc.subject.keywordAuthor | Mobile Xhaul | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Handover | - |
dc.subject.keywordAuthor | IoT | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.