Secure and efficient protocol for fast handover in 5G mobile Xhaul networks

Abstract Mobile networks are observing an all time increase in the number of users and services. These networks have hit the 5G requisites in no time. Current service providers are aiming at resolving issues of subsisting networks by exploiting the capacity and coverage enhancement features of 5G. With a broad spectrum, it has now become more facile to accommodate an astronomically immense number of devices each having multiple applications authoritatively mandating network accessibility. Despite these advantages, such networks suffer from several issues cognate to smooth operations of fronthaul and backhaul, such as interference management, link-reliability, flatness, security and flexibility. Integrating fronthaul and backhaul together as a Xhaul is suggested as one of the efficient solutions for handling these issues. Xhaul forms integrated planes which use heterogeneous switches for high optical transmissions. Despite being efficient, Xhaul links are weak in terms of security. The situations will be more serious, particularly when a massive number of User Equipment (UE) and IoT devices are now connected to it. This issue is further raised when the terminal fortifying the fronthaul and backhaul moves leading to the formation of mobile Xhaul network. The current security solutions for WiFi, WiMax, WiBro, 4G/LTE are unable to fortify privacy and perfect forward secrecy in mobile Xhaul network, which is a quandary targeted in this paper. To resolve these issues, a novel key exchange and authentication protocol is proposed, which is capable of securing Xhaul links for a moving terminal in the network. The proposed approach is tested utilizing mobile ground node and drone as moving terminal across multiple hubs. The formal analysis utilizing BAN logic and AVISPA tool slake the security requisites and performance evaluation justifies the efficiency in comparison with the existing solutions.

[1]  Andrei V. Gurtov,et al.  Secured VPN Models for LTE Backhaul Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[2]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[3]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[4]  Ravishankar Borgaonkar,et al.  Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications , 2012, NDSS.

[5]  Jean-Marie Bonnin,et al.  HOTA: Handover optimized ticket-based authentication in network-based mobility management , 2013, Inf. Sci..

[6]  Rajesh Kumar,et al.  Teredo tunneling-based secure transmission between UAVs and ground ad hoc networks , 2017, Int. J. Commun. Syst..

[7]  Ilsun You,et al.  SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.

[8]  Thomas Pfeiffer Next generation mobile fronthaul architectures , 2015, 2015 Optical Fiber Communications Conference and Exhibition (OFC).

[9]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[10]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[11]  Ilsun You,et al.  Towards formal analysis of wireless LAN security with MIS protocol , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[12]  Ian F. Akyildiz,et al.  5G roadmap: 10 key enabling technologies , 2016, Comput. Networks.

[13]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[14]  Mohammed Atiquzzaman,et al.  Cost analysis of mobility protocols , 2013, Telecommun. Syst..

[15]  Jean-Pierre Hubaux,et al.  Security Issues in Next Generation Mobile Networks: LTE and Femtocells , 2010 .

[16]  Ted H. Szymanski,et al.  Strengthening security and privacy in an ultra-dense green 5G Radio Access Network for the industrial and tactile Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[17]  Paul R. Prucnal,et al.  Adaptive Photonic Beamforming for Physical Layer Security of Mobile Signals in Optical Fronthaul Networks , 2014 .

[18]  Josep Mangues-Bafalluy,et al.  A service-based model for the hybrid software defined wireless mesh backhaul of small cells , 2015, 2015 11th International Conference on Network and Service Management (CNSM).

[19]  Alexander M. Haimovich,et al.  Optimal Fronthaul Quantization for Cloud Radio Positioning , 2014, IEEE Transactions on Vehicular Technology.

[20]  Paolo Bellavista,et al.  Transparent reallocation of control functions in IMS deployments , 2016, IEEE Communications Magazine.

[21]  Arturo Azcorra,et al.  Xhaul: toward an integrated fronthaul/backhaul architecture in 5G networks , 2015, IEEE Wireless Communications.

[22]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[23]  Zhi Ding,et al.  Wireless communications in the era of big data , 2015, IEEE Communications Magazine.

[24]  H. Vincent Poor,et al.  Secrecy Performance of Finite-Sized Cooperative Single Carrier Systems With Unreliable Backhaul Connections , 2016, IEEE Transactions on Signal Processing.

[25]  Yukihiko Okumura,et al.  Optical Network Technologies and Architectures for Backhaul/Fronthaul of Future Radio Access supporting Big Mobile Data , 2014 .

[26]  Paola Parolari,et al.  Optical fiber solution for mobile fronthaul to achieve cloud radio access network , 2013, 2013 Future Network & Mobile Summit.

[27]  Ilsun You,et al.  Enhancing SVO Logic for Mobile IPv6 Security Protocols , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[28]  Mohsen Guizani,et al.  5G wireless backhaul networks: challenges and research advances , 2014, IEEE Network.

[29]  Satoshi Nagata,et al.  Coordinated multipoint transmission and reception in LTE-advanced: deployment scenarios and operational challenges , 2012, IEEE Communications Magazine.

[30]  Ekram Hossain,et al.  5G cellular: key enabling technologies and research challenges , 2015, IEEE Instrumentation & Measurement Magazine.

[31]  Peter Schneider,et al.  Towards 5G Security , 2015, TrustCom 2015.

[32]  Luis M. Contreras,et al.  Operational, organizational and business challenges for network operators in the context of SDN and NFV , 2015, Comput. Networks.

[33]  Makis Stamatelatos,et al.  Rethinking the mobile and wireless network architecture: The METIS research into 5G , 2014, 2014 European Conference on Networks and Communications (EuCNC).

[34]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[35]  Supeng Leng,et al.  Architecture of heterogeneous wireless access networks: A short survey , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[36]  Mehdi Bennis,et al.  UAV-Assisted Heterogeneous Networks for Capacity Enhancement , 2016, IEEE Communications Letters.

[37]  Shlomo Shamai,et al.  Fronthaul Compression for Cloud Radio Access Networks: Signal processing advances inspired by network information theory , 2014, IEEE Signal Processing Magazine.

[38]  Thomas Zemen,et al.  Towards spectrum-programmable, mesh-enabled mobile xHaul through reconfigurable WDM overlay in fully-passive networks , 2015, 2015 17th International Conference on Transparent Optical Networks (ICTON).

[39]  Luca Valcarenghi,et al.  What Role for Photonics in Xhaul Networks of 5G systems , 2015 .

[40]  Nei Kato,et al.  Joint optimization of QoS and security for differentiated applications in heterogeneous networks , 2016, IEEE Wireless Communications.

[41]  Samuel Pierre,et al.  An enhanced fast handover with seamless mobility support for next-generation wireless networks , 2014, J. Netw. Comput. Appl..

[42]  Ronny Yongho Kim,et al.  WiMAX femtocell: requirements, challenges, and solutions , 2009, IEEE Communications Magazine.

[43]  Fabrizio Granelli,et al.  Software defined and virtualized wireless access in future wireless networks: scenarios and standards , 2015, IEEE Communications Magazine.

[44]  Matej Rohlik,et al.  New Trends in Femtocell Backhaul Security , 2013 .

[45]  Kun Wang,et al.  Migration strategies for FTTx solutions based on active optical networks , 2016, IEEE Communications Magazine.

[46]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[47]  Hui Yang,et al.  Performance evaluation of multi-stratum resources optimization with network functions virtualization for cloud-based radio over optical fiber networks. , 2016, Optics express.

[48]  Arturo Azcorra Trends in EU research for 5G Networks , 2015 .

[49]  Derrick Wing Kwan Ng,et al.  Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity , 2014, IEEE Transactions on Wireless Communications.

[50]  Ilsun You,et al.  Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover , 2017, Future Gener. Comput. Syst..

[51]  I Chih-Lin,et al.  NGFI, the xHaul , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[52]  Biswajit Nandy,et al.  Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[53]  Jeffrey G. Andrews,et al.  Femtocell networks: a survey , 2008, IEEE Communications Magazine.

[54]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[55]  Mu-En Wu,et al.  On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks , 2015, J. Univers. Comput. Sci..