Achieving 5As in Cloud Centric Cognitive Cellular Networks

The growing density of cellular users is placing an unprecedented demand on radio spectrum. Cognitive cellular networks can alleviate spectrum demand through dynamic spectrum access. In order to be fully functional, cellular users not only need spectrum access but also require network access. However, a cellular carrier grants network access only to accredited users. In this paper, we focus on the problem of opportunistic network access for unaccredited users by spontaneous provisioning in the context of cognitive cellular networks. We achieve this for both single and group users by extending the traditional 3A security framework - authentication, authorization, and accounting - to a 5A security paradigm. This entails the addition of network access and user assertion. We design several simulations based on a proof-of-principle prototype to validate our approach against multiple traffic models. The results show our approach can deliver at least 13% improvement in user provisioning time compared to conventional schemes.

[1]  Glen Zorn,et al.  Diameter Extensible Authentication Protocol (EAP) Application , 2005, RFC.

[2]  Makis Stamatelatos,et al.  The METIS 5G Architecture: A Summary of METIS Work on 5G Architectures , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[3]  Bala Srinivasan,et al.  Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens , 2010, ArXiv.

[4]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[5]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[6]  Madjid Nakhjiri,et al.  AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .

[7]  Xuemin Shen,et al.  Deploying cognitive cellular networks under dynamic resource management , 2013, IEEE Wireless Communications.

[8]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[9]  Bin Xiao Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings , 2007, ATC.

[10]  Yi Sun,et al.  Trust-Based Fast Authentication for Mobile IPv6 Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Michael Roe,et al.  Reducing Reauthentication Delay in Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  A. Wolisz,et al.  Primary Users in Cellular Networks: A Large-Scale Measurement Study , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[13]  Thomas Martin Knoll Life-cycle cost modelling for NFV/SDN based mobile networks , 2015, 2015 Conference of Telecommunication, Media and Internet Techno-Economics (CTTE).

[14]  Jon M. Peha,et al.  Real-Time Secondary Markets for Spectrum , 2003 .

[15]  Mark Jones,et al.  The Diameter 'Application Bridging for Federated Access Beyond Web (ABFAB)' Application , 2012 .

[16]  Harish Viswanathan,et al.  Group authentication: A new paradigm for emerging applications , 2012, Bell Labs Technical Journal.

[17]  Elisa Bertino,et al.  Identity Management: Concepts, Technologies, and Systems , 2010 .

[18]  C-ran the Road towards Green Ran , 2022 .