Cross-layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint

Authors

  • Wei Ao Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China
  • Jian Wei Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China
  • Yindong Li Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China
  • Xiaolong Zhang Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China
  • Bin Yu Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China
  • Kaiwen Hou Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

DOI:

https://doi.org/10.13052/jicts2245-800X.1234

Keywords:

5G, channel fingerprint, cross-layer, authentication mechanism

Abstract

In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.

Downloads

Download data is not yet available.

Author Biographies

Wei Ao, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Wei Ao, holds a Master’s degree in Engineering and is a senior engineer. He is a member of the Communist Party of China and graduated from Inner Mongolia University with a bachelor’s degree in Computer Science and Technology in July 2004. In the same year, he started working at Inner Mongolia Power Information and Communication Company. In June 2014, he graduated with a Master’s degree in Engineering from North China Electric Power University with a major in Industrial Engineering. In September 2023, he became the Deputy General Manager of Inner Mongolia Power Digital Research Company, responsible for scientific and technological innovation and production operation management. He has won three technical innovation achievements in the autonomous region’s power industry, one second prize in group company level management innovation achievements, five third prizes in scientific and technological progress awards, and four utility patents.

Jian Wei, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Jian Wei graduated from Changchun Institute of Technology in July 2015 with a bachelor’s degree. From July 2012 to November 2023, he worked at the Information and Communication Branch of Inner Mongolia Electric Power (Group) Co., Ltd. From November 2023 to present, he has been working at the Digital Research Branch of Inner Mongolia Electric Power (Group) Co., Ltd. His current main research directions are information technology construction, artificial intelligence, etc.

Yindong Li, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Yindong Li graduated from Inner Mongolia University of Technology with a Bachelor’s degree in Computer Science and Technology in 2007. He worked at the Information and Communication Branch of Inner Mongolia Electric Power (Group) Co., Ltd. from September 2007 to November 2023, and at the Digital Research Branch of Inner Mongolia Electric Power (Group) Co., Ltd. from November 2023 to present. His current main research direction is network security.

Xiaolong Zhang, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Xiaolong Zhang graduated from the Computer Science and Technology program at Inner Mongolia University in July 2021, where he obtained a Master of Engineering degree. From September 2021 to the present, he has been working at the Inner Mongolia Power Digital Research Company. His current primary research focus is on network security and network architecture.

Bin Yu, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Bin Yu, male, Mongolian, born in Jining, Inner Mongolia in February 1993. He started working in August 2016 and joined the Jiusan Society in December 2022. He holds a master’s degree in business administration and is a senior engineer. He is a member of the Chinese Society of Electrical Engineering and the Chinese Computer Society.

From September 2012 to June 2016, studied Communication Engineering at the School of Information Engineering, Wuyi University; 2016.08–2023.11 Assistant Engineer, Engineer, and Senior Engineer at the Information and Communication Branch of Inner Mongolia Electric Power (Group) Co., Ltd. (during which: Master’s degree in Business Administration at the School of Economics and Management, Inner Mongolia University from August 2019 to June 2022); From March 31, 2023 to present, Senior Engineer at the Digital Research Branch of Inner Mongolia Electric Power (Group) Co., Ltd.

Kaiwen Hou, Digital Research Branch of Inner Mongolia Power (Group) Co., Ltd, Hohhot, Inner Mongolia, China

Kaiwen Hou graduated from Inner Mongolia Agricultural University in July 2011 with a Bachelor’s degree in Engineering. From October 2011 to November 2023, he worked at the Information and Communication Branch of Inner Mongolia Electric Power (Group) Co., Ltd. From November 2023 to present, he has been working at the Digital Research Branch of Inner Mongolia Electric Power (Group) Co., Ltd. His current main research areas are power information system construction, network security, artificial intelligence, etc.

References

Xu, D., Yu, K., and Ritcey, J. A., ‘Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0’, IEEE Transactions on Industrial Informatics, 18(9), 6368–6378, 2021.

Lee, Y., Yoon, J., Choi, J., and Hwang, E., ‘A novel cross-layer authentication protocol for the Internet of Things’, IEEE Access, 8(1), 196135–196150, 2020.

Liu, X., Wang, J., Guo, S., and Wang, H., ‘A Survey on Cross-Layer Authentication in Wireless Communication Networks’, Journal of Networking and Network Applications, 4(1), 21–30, 2024.

Wang, M., Zhao, D., Yan, Z., Wang, H., and Li, T., ‘XAuth: Secure and privacy-preserving cross-domain handover authentication for 5G HetNets’, IEEE Internet of Things Journal, 10(7), 5962–5976, 2022.

Zhao, D., Yan, Z., Wang, M., Zhang, P., and Song, B., ‘Is 5G handover secure and private? A survey’, IEEE Internet of Things Journal, 8(16), 12855–12879, 2021.

Nagamani, K., and Monisha, R., ‘Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm’, Procedia Computer Science, 215(2), 380–392, 2022.

Zhao, H., Xu, M., Zhong, Z., and Wang, D., ‘A fast physical layer security-based location privacy parameter recommendation algorithm in 5G IoT’, China Communications, 18(8), 75–84, 2021.

Parween, S., Hussain, S. Z., Hussain, M. A., and Pradesh, A., ‘A survey on issues and possible solutions of cross-layer design in Internet of Things’, Int. J. Comput. Networks Appl, 8(4), 311–320, 2021.

Solaija, M. S. J., Salman, H., and Arslan, H., ‘Towards a unified framework for physical layer security in 5G and beyond networks’, IEEE Open Journal of Vehicular Technology, 3(1), 321–343, 2022.

Cui, Q., Zhu, Z., Ni, W., Tao, X., and Zhang, P., ‘Edge-intelligence-empowered, unified authentication and trust evaluation for heterogeneous beyond 5G systems’, IEEE Wireless Communications, 28(2), 78–85, 2021.

Salahdine, F., Han, T., and Zhang, N., ‘Security in 5G and beyond recent advances and future challenges. Security and Privacy, 6(1), e271–e280.

Ramadan, M., Liao, Y., Li, F., and Zhou, S., ‘Identity-based signature with server-aided verification scheme for 5G mobile systems’, IEEE Access, 8(2), 51810–51820, 2020.

Boodai, J., Alqahtani, A., and Frikha, M., ‘Review of Physical Layer Security in 5G Wireless Networks’, Applied Sciences, 13(12), 7277–7287, 2023.

Sun, Y., Tian, Z., Li, M., Zhu, C., and Guizani, N., ‘Automated attack and defense framework toward 5G security’, IEEE Network, 34(5), 247–253, 2020.

Wu, T., Guo, X., Chen, Y., Kumari, S., and Chen, C., ‘Amassing the security: An enhanced authentication protocol for drone communications over 5G networks’, Drones, 6(1), 10–17, 2021.

Han, S., Lee, Y., Choi, J., and Hwang, E., ‘Lightweight physical layer aided key agreement and authentication for the Internet of Things’, Electronics, 10(14), 1730–1738, 2021.

Sodhro, A. H., Pirbhulal, S., Sodhro, G. H., Muzammal, M., Zongwei, L., Gurtov, A., … and de Albuquerque, V. H. C., ‘Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system’, IEEE Transactions on Intelligent Transportation Systems, 22(8), 5223–5231, 2020.

Al-Aqrabi, H., Johnson, A. P., Hill, R., Lane, P., and Alsboui, T., ‘Hardware-intrinsic multi-layer security: A new frontier for 5G enabled IIoT’, Sensors, 20(7), 1963–1972, 2020.

Hao, Y., and Qiu, X., ‘MIMO cross-layer secure communication algorithm for cyber physical systems based on interference strategies’, IEEE Access, 8(5), 226797–226810, 2020.

Downloads

Published

2024-11-26

How to Cite

Ao, W. ., Wei, J. ., Li, Y. ., Zhang, X. ., Yu, B. ., & Hou, K. . (2024). Cross-layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint. Journal of ICT Standardization, 12(03), 311–336. https://doi.org/10.13052/jicts2245-800X.1234

Issue

Section

Intelligent System Concepts, architecture, standards, tools and applications

Most read articles by the same author(s)