检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Mamoon M.Saeed Mohammad Kamrul Hasan Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta
机构地区:[1]Electrical Engineering Department,Faculty of Engineering,Alzaiem Alazahri University,Khartoum,Sudan [2]Center for Cyber Security,Faculty of Information Science and Technology,Universiti Kebangsaan,Malaysia(UKM),43600,Bangi,Malaysia [3]Department of Computer Engineering,College of Computers and Information Technology,Taif University,PO Box 11099,Taif,21944,Saudi Arabia [4]Department of Electronics Engineering,College of Engineering,Sudan University of Science and Technology,Khartoum,Sudan [5]Department of Electronics and Communication Engineering,JECRC University,Jaipur,India
出 处:《Computers, Materials & Continua》2022年第3期5551-5568,共18页计算机、材料和连续体(英文)
基 金:The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme GGPM-2020-028 funded this research.
摘 要:The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.
关 键 词:5G privacy and security user identity IMSI authentication and key agreement(AKA)
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.191.144.80