5G wireless P2MP backhaul security protocol: an adaptive approach

Abstract5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates. Such diverse and perplexing network requirements bring numerous issues, among which security stands in the first row. The backhaul, which can be implemented as a wired or wireless solution, serves as a bridge between the radio access and core networks assuring connectivity to end users. The recent trends in backhaul usage rely on wireless technologies implemented using point-to-point (PTP) or point-to-multipoint (P2MP) configurations. Unfortunately, due to the nature of the transmission medium, the wireless backhaul is vulnerable and exposed to more various security threats and attacks than the wired one. In order to protect the backhaul, there have been several researches, whose authentication and key exchange scheme mainly depends on the existing security standards such as transport layer security (TLS), Internet Key Exchange version 1 (IKEv1), IKEv2, Host Identity Protocol (HIP), and Authentication and Key Agreement (AKA). However, such security standards cannot completely fulfil the security requirements including security policy update, key update, and balancing between security and efficiency, which are necessary for the emerging 5G networks. This is basically the motive behind why we study and propose a new security protocol for the backhaul link of wireless access network based on P2MP model. The proposed protocol is designed to be 5G-aware, and provides mutual authentication, perfect forward secrecy, confidentiality, integrity, secure key exchange, security policy update, key update, and balancing trade-off between efficiency and security while preventing resource exhaustion attacks. The protocol’s correctness is formally verified by the well-known formal security analysis tools: BAN-logic and Scyther. Moreover, the derived lemmas prove that the security requirements are satisfied. Finally, from a comparison analysis, it is shown that the proposed protocol is better than other standard protocols.

[1]  Federica Verdini,et al.  Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons , 2017, Journal of Ambient Intelligence and Humanized Computing.

[2]  C. Mala,et al.  Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[3]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[4]  Salimur Choudhury,et al.  Scheduling RFID networks in the IoT and smart health era , 2019, J. Ambient Intell. Humaniz. Comput..

[5]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.

[6]  Quang Duong,et al.  Ultra-dense Networks for 5G and Beyond , 2019 .

[7]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[8]  Cas J. F. Cremers,et al.  Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.

[9]  Quang Duong Physical Layer Security for Ultra-Dense Networks under Unreliable Backhaul Connection , 2019 .

[10]  Mehdi Bennis,et al.  Securing the backhaul for mobile and multi-homed femtocells , 2011, 2011 Future Network & Mobile Summit.

[11]  Colin Boyd,et al.  On a Limitation of BAN Logic , 1994, EUROCRYPT.

[12]  Andrei V. Gurtov,et al.  Novel secure VPN architectures for LTE backhaul networks , 2016, Secur. Commun. Networks.

[13]  Dan Simon,et al.  The EAP-TLS Authentication Protocol , 2008, RFC.

[14]  Ilsun You,et al.  Enhancing SVO Logic for Mobile IPv6 Security Protocols , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[15]  I. Mesogit,et al.  Fiber-Wireless Fronthaul/Backhaul Network Architectures for 5G , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[16]  Hannes Tschofenig,et al.  The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method , 2008, RFC.

[17]  Symeon Chatzinotas,et al.  Power and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[18]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[19]  Muhammad Ali Imran,et al.  5G Backhaul Challenges and Emerging Research Directions: A Survey , 2016, IEEE Access.

[20]  Andrei Gurtov,et al.  A Case Study on Security Issues in LTE Backhaul and Core Networks , 2014 .

[21]  Fang-Yie Leu,et al.  Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..

[22]  Mohamed-Slim Alouini,et al.  FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks , 2016, IEEE Communications Magazine.

[23]  Michael D. Ernst,et al.  Computer Aided Verification , 2016, Lecture Notes in Computer Science.

[24]  Thomas Plantard,et al.  Device Identification and Personal Data Attestation in Networks , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[25]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[26]  Paul E. Hoffman,et al.  Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.

[27]  Pekka Nikander,et al.  A Bound End-to-End Tunnel (BEET) mode for ESP , 2008 .

[28]  Yi-Bing Lin,et al.  Automatic Blocking Mechanism for Information Security with SDN , 2019, J. Internet Serv. Inf. Secur..

[29]  Dong In Kim,et al.  Wireless backhauling of 5G small cells: challenges and solution approaches , 2015, IEEE Wireless Communications.

[30]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.

[31]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[32]  J. van Leeuwen,et al.  Foundations of Security Analysis and Design , 2001, Lecture Notes in Computer Science.

[33]  P. Eronen Network Working Group Ikev2 Mobility and Multihoming Protocol (mobike) , 2006 .

[34]  Andrei V. Gurtov,et al.  Secured VPN Models for LTE Backhaul Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[35]  Vishal Sharma,et al.  A Survey on the Security of Pervasive Online Social Networks (POSNs) , 2018, J. Internet Serv. Inf. Secur..

[36]  Paul F. Syverson,et al.  The Logic of Authentication Protocols , 2000, FOSAD.

[37]  Vincent K. N. Lau,et al.  Cost Efficiency Optimization of 5G Wireless Backhaul Networks , 2016, IEEE Transactions on Mobile Computing.

[38]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[39]  Pekka Nikander,et al.  Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.

[40]  Yannick Chevalier,et al.  A visual analytics approach for the cyber forensics based on different views of the network traffic , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[41]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[42]  Ilsun You,et al.  SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.

[43]  Vishal Sharma,et al.  Security of 5G-Mobile Backhaul Networks: A Survey , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[44]  Vishal Sharma,et al.  A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks , 2019, 5G Enabled Secure Wireless Networks.

[45]  Fadi Al-Turjman,et al.  Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.