Font Size: a A A

Research On Security Authentication Technologies For 5G Networks

Posted on:2021-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:F Y RenFull Text:PDF
GTID:2428330614960748Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the unceasing improvement of the performance and security requirements of communication networks,the fifth-generation Mobile Communication Technology(5G)with unprecedented attention has developed rapidly.5G as a new generation of mobile communication technology proposed to realize the interconnection of all things has also become a hot topic in academic research.5G wireless network is flexible,open and highly heterogeneous.It can not only provide traditional voice and data communication but also can be applied to many scenarios,such as internet of vehicles,smart grid,smart city,and smart medical treatment.While 5G network brings convenience to us,it also faces various security and performance challenges,such as user privacy protection,secure data transmission,high concurrent access and limited resources.The data sent by the sender contains a lot of privacy and sensitive information.Once the data leak occurs during the data transmission process,it will cause incalculable losses to the user,so the secure transmission of data is crucial.In the large-scale Io T scenario,a large number of devices are highly concurrently accessed.If each device is individually authenticated,the authentication overhead is huge and the network burden is excessive.For Io T devices with limited resources and limited protection measures,they can not rely entirely on preset shared key or public key certificates for authentication.Faced with these challenges,it is necessary to further explore user privacy and communication security.This thesis analyzes the possible security threats in 5G network.By studying the existing privacy protection and authentication technologies,two efficient and secure access authentication schemes are proposed.1.Aiming at the problem of large communication overhead in the access authentication process between a large number of Io T terminals and 5G network in the traditional authentication process,a certificateless multi-party authentication encryption scheme is proposed.Combined with certificateless aggregate signcryption technology,it simplifies the authentication process and ensures the security of the data transmission process.The proposed scheme combines the access authentication process and the data transmission process into one,which not only achieves multi-party authentication but also provides anonymity and non-repudiation of identity.In addition,when multiple Io T devices perform identity authentication at the same time,the information of terminals and encrypted data are sent to the Access and Mobility Management Function server(AMF),and the aggregate signature generated by AMF is verified to verify the validity and security of the data.Security analysis and experimental results show that the scheme is secure and efficient.2.Aiming at the signaling overhead caused by high concurrent access in 5G network,a mutual authentication and data transmission scheme based on certificateless signcryptionis proposed.This scheme builds Io T groups,and the group leader sends aggregated messages to the network,effectively reducing the number of signaling message,reducing signaling overhead,and reducing network burden.In addition,this scheme integrates the process of access authentication and secure data transmission,while achieving mutual authentication and data transmission between a group of Io T devices and network.This not only simplifies the authentication process,reduces authentication overhead and communication overhead,but also ensures the privacy of user identity and data integrity.Security analysis and experimental results show that the scheme is secure and efficient.
Keywords/Search Tags:5G, access authentication, multi-party authentication, aggregate authentication, certificateless signcryption
PDF Full Text Request
Related items