IEEE Open Journal of the Communications Society (Jan 2021)

Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain

  • Zaher Haddad,
  • Mohamed Baza,
  • Mohamed M. E. A. Mahmoud,
  • Waleed Alasmary,
  • Fawaz Alsolami

DOI
https://doi.org/10.1109/OJCOMS.2021.3131552
Journal volume & issue
Vol. 2
pp. 2616 – 2627

Abstract

Read online

The fifth generation (5G) cellular network provides users with high-quality services due to its high transmission rate and low latency. It will support Internet of Things (IoT) devices and enable new applications in health, banking, education, etc. Security is essential in this network because vulnerabilities may be exploited to disrupt these applications which may directly impact our life. Authentication and key agreement (AKA) and handover (HO) are usually the target of cyberattacks in any cellular network. On the other hand, blockchain is a peer-to-peer network that aims to maintain an immutable and secure ledger. This new technology will be used widely to secure many applications. This paper aims to develop an efficient and secure AKA scheme and uniform handover protocol for 5G network using blockchain. The home network (HN) is not involved in the AKA scheme and HO protocol to protect the HN from attacks, such as denial of service (DoS) attacks, and also lower the communication and computation overhead. Moreover, our HO protocol is uniform in the sense that it can be used for all HO scenarios. The protocol is also efficient because it requires exchanging a few amount of data. It can also achieve forward/backward secrecy. Furthermore, the blockchain is used to verify the public keys of the network nodes which is necessary to secure our AKA scheme and HO protocol. It also records the locations of the users which is necessary for the functionality of the network. Our evaluations demonstrate that the proposed HO protocol is secure, uniform, and can achieve the forward/backward secrecy. Furthermore, our AKA scheme requires lower computation and computation overhead comparing to the existing schemes, and preserves the energy of the limited-energy mobile devices.

Keywords