Packet Replays Prevention Protocol for Secure B5G Networks

1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (IoT) application domains such as smart homes, smart cities and in intelligent transport systems. Massive and private data flows in these ultra-dense networks and hence the need to protect them. As such, the Third-Generation Partnership Project (3GPP) has defined Authentication and Key Agreement (AKA) protocols for secure signaling and packet exchanges in these networks. However, these AKA protocols are susceptible to numerous attacks, such as impersonation and packet replays. This has seen the development of numerous schemes based on techniques such as public key cryptography, biometrics, group signatures and blockchain. Unfortunately, these schemes fail to offer the required levels of security and privacy protection at low execution time, energy and bandwidths. In this paper, a protocol is developed that leverages on the message authentication codes, symmetric cryptography and elliptic curve cryptography. It is shown that the proposed protocol is secure under the Dolev–Yao model. In terms of performance, it exhibited the lowest execution time and has the lowest bandwidth requirements.

Cite

CITATION STYLE

APA

Nyangaresi, V. O., Ma, J., Al Sibahee, M. A., & Abduljabbar, Z. A. (2023). Packet Replays Prevention Protocol for Secure B5G Networks. In Lecture Notes in Networks and Systems (Vol. 448, pp. 507–522). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-1610-6_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free