Font Size: a A A

Research On Identity Authentication Protocol In 5G Network

Posted on:2019-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:T JiFull Text:PDF
GTID:2428330572950214Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
At present,the standardization work of 5G is in the process of formulation,the relevant manufacturers have entered the research and development stage,and it is expected to be commercially available in 2020.Compared with 4G,5G introduces new architecture and technology and changes in user's business.In the face of these challenges,it is necessary to further explore and study the privacy and communication security of the user.The existing mobile communication access authentication mechanism has the following three problems:?1?The IMSI?International Mobile Subscriber Identification Number?on the empty port is transmitted in plaintext mode,which will cause the user's identity information and location information to be leaked.In 5G network,it is necessary to design anonymous access authentication mechanism to protect users'identity privacy IMSI.?2?The 5G network supports the large-scale Massive Machine Type Communication scene,and the existing 4G network authentication mechanism does not take into account the massive authentication signaling problem caused by the high concurrent access of large quantities of equipment in the large-scale Internet of things scene.If each device's each cancellation is authenticated,it will consume a large amount of resources of the authentication network.Once overload,it will trigger a signaling storm asnd result in instability of network services,and even lead to the whole mobile communication system unable to maintain normal communication needs.?3?The Internet of things has the characteristics of limited resources,unmanned and so on.It is vulnerable to security threats such as cloned attack.The network equipment with limited protection measures can not completely rely on the preset shared key or public key certificate,so the authentication method based on cryptography can not be very simple.A good solution to its identity authentication problem.In view of the above problems,the following work has been done in this graduation thesis.1,Analyze the existing EPS-AKA access authentication protocol and its current security threats,which shows that the protocol can no longer meet the needs of future 5G scenarios.According to the different application access authentication objects,the existing access authentication schemes are classified and the advantages and disadvantages of various schemes are analyzed.This paper explains the attribute encryption algorithm based on key strategy?KP-ABE?and the non cloned function system?PUFS?as a tool.2.An anonymous access authentication scheme based on KP-ABE is proposed for the devices with strong computing power,such as smart mobile phones.The scheme protects the user's privacy information by encrypting the encryption algorithm and establishing the pseudonym between the user equipment and the home network,and gives the re-authentication protocol and roaming handover authentication protocol according to the different access authentication scenes.3.A group based access authentication scheme,which is based on group based access authentication scheme,is proposed in view of the weak computing power of RFID tags and sensors.The scheme realizes the identity authentication of the IOT devices through PUFS.The security does not depend on the main keyKASMEand provides a new security access mechanism for the limited protection of the Internet of things.4.The security analysis and performance analysis of the two proposed schemes show that the proposed schemes can resist a variety of common attacks,provide perfect forward secrecy.In the premise of ensuring the authentication process and subsequent communication under the safety,the protocol has good execution efficiency,and can be both efficient and safe.
Keywords/Search Tags:5G network, disclosure of identity privacy, authentication scene, IoT devices authentication
PDF Full Text Request
Related items