Cross-layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint
DOI:
https://doi.org/10.13052/jicts2245-800X.1234Keywords:
5G, channel fingerprint, cross-layer, authentication mechanismAbstract
In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.
Downloads
References
Xu, D., Yu, K., and Ritcey, J. A., ‘Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0’, IEEE Transactions on Industrial Informatics, 18(9), 6368–6378, 2021.
Lee, Y., Yoon, J., Choi, J., and Hwang, E., ‘A novel cross-layer authentication protocol for the Internet of Things’, IEEE Access, 8(1), 196135–196150, 2020.
Liu, X., Wang, J., Guo, S., and Wang, H., ‘A Survey on Cross-Layer Authentication in Wireless Communication Networks’, Journal of Networking and Network Applications, 4(1), 21–30, 2024.
Wang, M., Zhao, D., Yan, Z., Wang, H., and Li, T., ‘XAuth: Secure and privacy-preserving cross-domain handover authentication for 5G HetNets’, IEEE Internet of Things Journal, 10(7), 5962–5976, 2022.
Zhao, D., Yan, Z., Wang, M., Zhang, P., and Song, B., ‘Is 5G handover secure and private? A survey’, IEEE Internet of Things Journal, 8(16), 12855–12879, 2021.
Nagamani, K., and Monisha, R., ‘Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm’, Procedia Computer Science, 215(2), 380–392, 2022.
Zhao, H., Xu, M., Zhong, Z., and Wang, D., ‘A fast physical layer security-based location privacy parameter recommendation algorithm in 5G IoT’, China Communications, 18(8), 75–84, 2021.
Parween, S., Hussain, S. Z., Hussain, M. A., and Pradesh, A., ‘A survey on issues and possible solutions of cross-layer design in Internet of Things’, Int. J. Comput. Networks Appl, 8(4), 311–320, 2021.
Solaija, M. S. J., Salman, H., and Arslan, H., ‘Towards a unified framework for physical layer security in 5G and beyond networks’, IEEE Open Journal of Vehicular Technology, 3(1), 321–343, 2022.
Cui, Q., Zhu, Z., Ni, W., Tao, X., and Zhang, P., ‘Edge-intelligence-empowered, unified authentication and trust evaluation for heterogeneous beyond 5G systems’, IEEE Wireless Communications, 28(2), 78–85, 2021.
Salahdine, F., Han, T., and Zhang, N., ‘Security in 5G and beyond recent advances and future challenges. Security and Privacy, 6(1), e271–e280.
Ramadan, M., Liao, Y., Li, F., and Zhou, S., ‘Identity-based signature with server-aided verification scheme for 5G mobile systems’, IEEE Access, 8(2), 51810–51820, 2020.
Boodai, J., Alqahtani, A., and Frikha, M., ‘Review of Physical Layer Security in 5G Wireless Networks’, Applied Sciences, 13(12), 7277–7287, 2023.
Sun, Y., Tian, Z., Li, M., Zhu, C., and Guizani, N., ‘Automated attack and defense framework toward 5G security’, IEEE Network, 34(5), 247–253, 2020.
Wu, T., Guo, X., Chen, Y., Kumari, S., and Chen, C., ‘Amassing the security: An enhanced authentication protocol for drone communications over 5G networks’, Drones, 6(1), 10–17, 2021.
Han, S., Lee, Y., Choi, J., and Hwang, E., ‘Lightweight physical layer aided key agreement and authentication for the Internet of Things’, Electronics, 10(14), 1730–1738, 2021.
Sodhro, A. H., Pirbhulal, S., Sodhro, G. H., Muzammal, M., Zongwei, L., Gurtov, A., … and de Albuquerque, V. H. C., ‘Towards 5G-enabled self adaptive green and reliable communication in intelligent transportation system’, IEEE Transactions on Intelligent Transportation Systems, 22(8), 5223–5231, 2020.
Al-Aqrabi, H., Johnson, A. P., Hill, R., Lane, P., and Alsboui, T., ‘Hardware-intrinsic multi-layer security: A new frontier for 5G enabled IIoT’, Sensors, 20(7), 1963–1972, 2020.
Hao, Y., and Qiu, X., ‘MIMO cross-layer secure communication algorithm for cyber physical systems based on interference strategies’, IEEE Access, 8(5), 226797–226810, 2020.