Visible to the public An Approach for End-to-End (E2E) Security of 5G Applications

TitleAn Approach for End-to-End (E2E) Security of 5G Applications
Publication TypeConference Paper
Year of Publication2018
AuthorsKumari, K. A., Sadasivam, G. S., Gowri, S. S., Akash, S. A., Radhika, E. G.
Conference Name2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)
Date Publishedmay
Keywords3D PAKE protocol, 5G Applications, 5G mobile communication, 5G protocols, attack resistance rate, attack surface, authentication, communication complexity, compositionality, computation complexity, computer network security, confidentiality, cryptographic protocols, dependable security mechanism, differentiated security, diffie hellman key exchange, E2E, Elliptic curve cryptography, End to End Security analysis, End-to-End data protection, end-to-end security, flexible security mechanism, heterogeneous environment, heterogeneous networked society, industrial vision, Intelligent Data and Security, Intelligent Data Security, Internet, Internet Security Protocols, key business driver, Key Management, manifold applications, message authentication, networking paradigms, next-generation mobile technology, Protocols, pubcrawl, Resiliency, Resistance, Scalability, security defensive rate, security operations, security threats, Servers, Tetrahedron property analysis, Three-dimensional displays
AbstractAs 5G transitions from an industrial vision to a tangible, next-generation mobile technology, security remains key business driver. Heterogeneous environment, new networking paradigms and novel use cases makes 5G vulnerable to new security threats. This in turn necessitates a flexible and dependable security mechanism. End-to-End (E2E) data protection provides better security, avoids repeated security operations like encryption/decryption and provides differentiated security based on the services. E2E security deals with authentication, integrity, key management and confidentiality. The attack surface of a 5G system is larger as 5G aims for a heterogeneous networked society. Hence attack resistance needs to be a design consideration when defining new 5G protocols. This framework has been designed for accessing the manifold applications with high security and trust by offering E2E security for various services. The proposed framework is evaluated based on computation complexity, communication complexity, attack resistance rate and security defensive rate. The protocol is also evaluated for correctness, and resistance against passive, active and dictionary attacks using random oracle model and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool.
DOI10.1109/BDS/HPSC/IDS18.2018.00038
Citation Keykumari_approach_2018