Secure and Efficient Vertical Handover Authentication for 5G HetNets

5G is a new paradigm that brings new technologies to overcome the challenges of the next-generation wireless mobile network. Also, 5G is expected to supply fastest, most reliable network access to support huge data traffic and massively connected nodes with low latency and high throughput. There are different new technologies that are emerging to tackle requirements of the future wireless mobile network, such as Network Function Virtualization (NFV), Software Defined Networking (SDN) and cloud computing. The heterogeneous environment of 5G will cause frequent handoff in small cells where users join and leave frequently. Therefore, in this paper, the focus is on secure and seamless handover mechanism to supply strong, quick and mutual authentication. And, a careful attention is needed to security challenges, therefore, potential pitfalls can be avoided. It is begun by explaining emerging technologies for the 5G mobile network. Then, the architecture of SDN is briefly described. Finally, this article presents a fast and efficient vertical handover authentication for next-generation wireless mobile communication - 5G - based on SDN architecture.

[1]  R. Manoharan,et al.  A secure certificate based authentication to reduce overhead for heterogeneous wireless network , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[2]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[3]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[4]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[5]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[6]  Riccardo Trivisonno,et al.  SDN-based architecture and procedures for 5G networks , 2014, 1st International Conference on 5G for Ubiquitous Connectivity.

[7]  Shaiful Jahari Hashim,et al.  An efficient authentication and key agreement protocol for 4G (LTE) networks , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[8]  Noureddine Zahid,et al.  Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA , 2012, The First International Conference on Future Generation Communication Technologies.

[9]  S. Figuerola,et al.  5G network challenges and realization insights , 2016, 2016 18th International Conference on Transparent Optical Networks (ICTON).

[10]  Jianhua Li,et al.  Toward Vulnerability Assessment for 5G Mobile Communication Networks , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[11]  Dan Simon,et al.  The EAP-TLS Authentication Protocol , 2008, RFC.

[12]  Volker Jungnickel,et al.  Software-defined open architecture for front- and backhaul in 5G mobile networks , 2014, 2014 16th International Conference on Transparent Optical Networks (ICTON).

[13]  Mohsen Guizani,et al.  Software-defined networking security: pros and cons , 2015, IEEE Communications Magazine.

[14]  A. Punitha,et al.  Survey on wireless technologies and security procedures , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).