Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets

Creating a secure environment for communications is becoming a significantly challenging task in 5G Heterogeneous Networks (HetNets) given the stringent latency and high capacity requirements of 5G networks. This is particularly factual knowing that the infrastructure tends to be highly diversified especially with the continuous deployment of small cells. In fact, frequent handovers in these cells introduce unnecessarily recurring authentications leading to increased latency. In this paper, we propose a software-defined wireless network (SDWN)- enabled fast cross- authentication scheme which combines non- cryptographic and cryptographic algorithms to address the challenges of latency and weak security. Initially, the received radio signal strength vectors at the mobile terminal (MT) is used as a fingerprinting source to generate an unpredictable secret key. Subsequently, a cryptographic mechanism based upon the authentication and key agreement protocol by employing the generated secret key is performed in order to improve the confidentiality and integrity of the authentication handover. Further, we propose a radio trusted zone database aiming to enhance the frequent authentication of radio devices which are present in the network. In order to reduce recurring authentications, a given covered area is divided into trusted zones where each zone contains more than one small cell, thus permitting the MT to initiate a single authentication request per zone, even if it keeps roaming between different cells. Accordingly, once the RSS vectors and the encrypted mobile identification are received by the authentication slice (AS), this latter builds the authentication vector using the k- nearest neighborhood technique to estimate the kdh fingerprint distribution which is compared to the radio trusted zones database to prove the legitimacy of the MT and the network slice (NS). Cross-layer authentication protocol is consequently executed. The proposed scheme is analyzed under different attack scenarios and its complexity is compared with cryptographic and non-cryptographic approaches to demonstrate its security resilience and computational efficiency.

[1]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[2]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Aydin Behnad,et al.  Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Ian F. Akyildiz,et al.  SoftAir: A software defined networking architecture for 5G wireless systems , 2015, Comput. Networks.

[5]  Masoumeh Purkhiabani,et al.  Enhanced authentication and key agreement procedure of next generation evolved mobile networks , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[6]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[7]  Xianbin Wang,et al.  Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer , 2016, 2016 IEEE International Conference on Communications (ICC).

[8]  Yucheng Zhang,et al.  A novel 3GPP SAE authentication and key agreement protocol , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[9]  Simo Ali-Löytty,et al.  A comparative survey of WLAN location fingerprinting methods , 2009, 2009 6th Workshop on Positioning, Navigation and Communication.

[10]  Xiqi Gao,et al.  Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.

[11]  Yongjun Wang,et al.  Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[12]  Jacques Bou Abdo,et al.  Ensured confidentiality authentication and key agreement protocol for EPS , 2012, 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA).

[13]  Andrew G. Dempster,et al.  Indoor Location Fingerprinting Using FM Radio Signals , 2014, IEEE Transactions on Broadcasting.

[14]  Xianbin Wang,et al.  Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates , 2012, 2012 IEEE International Conference on Communications (ICC).

[15]  A. Lozano,et al.  What Will 5 G Be ? , 2014 .

[16]  Ayman I. Kayssi,et al.  Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.