Вы находитесь на странице: 1из 6

5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

Secure Authentication Protocol for 5G Enabled IoT Network


Suraj Sharma1 , Shaswat Satapathy1 , Shivani Singh1 , Amiya Kumar Sahu1 , Mohammad S. Obaidat, Fellow of
IEEE2 , Sanjay Saxena1 , and Deepak Puthal3
1 International Institute of Information Technology, Bhubaneswar, India

Email: {suraj, sanjay}@iiit-bh.ac.in; {shaswat221b, shivanisinghn11, amiyakumar20072}@gmail.com


2 ECE Department, Nazarbayev University, Astana, Kazakhstan

King Abdullah II School of IT, University of Jordan, Jordan


University of Science and Technology Beijing (USTB), Beijing, China
Email: msobaidat@gmail.com;
3 University of Technology Sydney, Australia

Email: deepak.puthal@gmail.com

Abstract—The rapid growth of Internet of Things(IoT) along • 3G Cellular networks: When Internet became the most
with wide range of applications made IoT popular. Moreover,the useful technology around the globe then the concept of
network connectivity and communication support is provided Universal Mobile Telecommunication System (UMTS)
by 5G technology. The mobile technology is also becoming the
essential component of Social life, which is also becoming the emerged as a promising technology to provide a data rate
essential interface for IoT. Various services of IoT may be availed of around 2 Mbps [8].
from IoT server, which are enabled with 5G network technology. • 4G Cellular networks: It provides all Internet protocol
The IoT service access would require a intermediate access and packet switching based communication services
network to connect to 5G, and access network may be publicly such as IP telephony. The peak data rate provided by
accessible. Hence, there exists security threat to user’s data.
Here, In this paper, We provided an application layer security 4G-LTE for downloading is around 100 Mbps and for
protocol to mitigate all those attacks originating from public LTE-Advanced is 1000 Mbps [9].
access network. We have also tested the security protocol by an
automated security testing tool, Scyther. The security protocol
exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-
Inective Synchronization.The protocol is resistant to various
attacks, which could originate from Confidentiality, Integrity and A. Features of 3GPP architecture
Availability. The user-credentials and services-request are secretly
According to 3GPP Service based Architecture in 3GPP TS
communicated, thereby preserving the privacy.
23.501 [10], the architecture contains mainly two planes i.e.
Index Terms—Authentication, IoT, Security, 5G Service Slice Control plane and User plane.The user plane function (UPF)
consists of packet routing, packet forwarding, policy enforce-
I. INTRODUCTION ment,branching point to support multi-homed public display
With the evolution of communication industry from LTE unit (PDU) sessions and handling quality of service(QOS).
to 5G, it will provide a platform for emanating technologies The control plane consists mainly of the following func-
such as IoT and IoV to be an integral part of our economy and tions:
society as a whole [1][2][3][4]. There is an increased demand • Access and Mobility Management (AMF): It is respon-
of bandwidth, ultra- low latency, and potential to manage huge sible for maintaining mobility, registration and reacha-
number of connected devices. Further, the features of 5G over bility management.It provides access authentication, ac-
4G-LTE are low latency upto 1 millisecond, bandwidth per cess authorization, Security Anchor Function support
unit area estimated to be 1000x, 1-10 Gbps speed, energy (SEAF) support and Security Context Management Func-
efficient, 99 percent availability and many more [5]. The entire tion (SCMF) support.
5G network services can be classified into three different cate- • Session Management Function (SMF): It is responsible
gories: enhanced mobile broadband (eMBB), massive machine for managing sessions, allocating IP address for user
type communications (mMTC), and ultra-reliable and low- equipment, user plane selection and controlling policy
latency communications (uRLLC) as per The International enforcement and QOS.
Telecommunication Union (ITU) [6]. The evolution in the shift • Unified Data Management (UDM): It is responsible
of paradigm of the mobile communication industry from 2G for Authentication Credential Repository and Processing
to 5G are as follows: Function (ARPF) support and subscription of data stor-
• 2G cellular networks: The technology used is Global age.
System for Mobile communication(GSM) and enabling • Policy Control Function (PCF): It is responsible for
services offered are normal voice system, fax, text mes- making policies for Control plane.
sage services, etc. with data rate of around 9.6-10.0 Kbps • Authentication Server Function (AUSF): It provides au-
[7]. thentication for various services and user equipment(UE).
978-1-5386-6026-3/18/$31©2018 IEEE 621
5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

• Network Slice Selection Function (NSSF): It chooses the III, we describe the proposed security protocol. Section IV
group of network slice instances serving the UE, de- contains of the results of the security simulations. The paper
termining allowed Network S lice Selection Association concludes with Section V where we also suggest some future
Information (NSSAI) and determining the AMF Set to be works.
used to serve the UE.
Security protocols applied to different functions are ARPF, II. R ELATED W ORKS
SEAF, SCMF and SPCF. Authentication Credential Repository
and Processing Function (ARPF) are emplaced with UDM so The objective of the research & development of 5G
as to store the security credentials for authentication and exe- is to increase the mobile broadband users, more capacity
cute cryptography algorithms [11]. Security Anchor Function than today’s 4G network, supporting the communication
support (SEAF) presented in the AMF is used to store visited between device to device (D2D) and huge comminucations
network’s root key and separation of mobility function from of machine-type [19]. To do so, different techniques are
anchor function. The Security Context Management Function applied to 5G, like massive multiple-input multiple-output
(SCMF) generates the additional security key for the network, (MIMO), full duplex communication, heterogeneous networks
which can be generated by SEAF key. The Secure policy (HetNet), millimeter wave (mmWave) [20] and networking
control function(SPCF) is collaborated with PCF to provide slicing [21]. In this paper, our main focus would be on the
the security policy to the network,integrity and confidentiality network slicing concept involved in 5G. In [22] an end-to-end
protection. vertical and horizontal slicing technique for 5G system is
proposed. In this work vertical slicing is used for the vertical
industry and services where as horizontal slicing is used
B. IoT Reference Model
to improve the capacity of the system & experience of the
The rapid rise in the connected physical objects, and their user. Zhou et al. [23] presented hierarchical network slicing
accompanying applications surrounding us, often collectively architecture, helping operators to offer customized end-
referred to as the Internet of Things (IoT) has lead to a to-end cellular networks as a service. Ksentini et al. [24]
growing interest and attention from the everyone including proposed a framework to enforce network slices, featuring
governments, the industry, the scientific community amongst radio resources abstraction based on the 3GPP DCN and a
other communities. Ericsson projects that by 2021, 28 billion flexible RAN. Previous works present several network slicing
of smart device wearable devices will be connected where strategies for wireless network but unfortunately the security
15 billion M2M connected devices will be available across of slice selection is ignored, which leads to user privacy
the globe [12]. While Machina Research forecasts that “IoT leakage.
will account for one-quarter of the global 41 million 5G
connections in 2024.”[13] 3GPP TS 23.501 [10] specifies the system architecture
The numerous opportunities presented by the IoT industry, for the 5G System, the major changes being introduction
however, often come at the cost of privacy and security threats, of network slicing concept, user plane separation, a new
in exchange for fine-grained sensing and data analytic. The service based architecture and a flexible Non-3GPP access
IoT Architectural framework can be subdivided into perception inter-working. This paper also presents the new security
layer, network layer, application layer[14] and [15]. Security features of the 5G core network with respect to the key
challenges in each of these layers are described below briefly: areas like User Plane security termination, authentication and
• Perception Layer: Due to limitation of computational authorization, RAN security, and security within UE and
ability and low power consumption, it is more prone to network slicing security.
security threats. Interception of nodes by a third party and
confidentiality exploitation, timing attack are the major Jianbing et al. proposed an secure and efficient service-
issues [16]. oriented authentication framework which supports the network
• Network Layer: It is susceptible to eavesdropping, passive slicing technique for 5G-enabled IoT (ES 3 A) [25]. 5G com-
monitoring and Man In The Middle Attack. Therefore, bines a variety of new and complex wireless technologies such
secure key exchange mechanism is needed to prevent as D2D, etc. HEnce, it needs lightweight security techniques.
identity thefts [17]. In [26] Fei Pan et al. proposed a lightweight multi-tier au-
• Application Layer: Integrity between different application thentication architecture. However, no simulation was done to
and their respective authentication mechanism to avert prove the correctness of the proposed framework.
privacy and authentication threats [18]. Since 5G is a heterogeneous network, key generation for
encryption, distribution,etc. are going to be extremely chal-
To address some of these issues, we propose an Authenti- lenging because of its dynamic nature. To resolve this issue,
cation framework supporting privacy-preserving slice selec- Hamamreh et al. [27] proposed a physical layer security tech-
tion and authenticated key agreement for 5G-enabled IoT. nique for safeguarding the transmission of OFDM waveforms
It enables the IoT service provider to generate anonymous against eavesdropping in 5G.
delegation for subscribed users to access IoT services. The NGMN (Next Generation Mobile Networks) has
The rest of the paper is organized as follows: Section II pointed new attacks and security issues which may arise with
discusses different existing methods for security. In Section 5G system [21]. The NGMN allinace proposed 5G security
978-1-5386-6026-3/18/$31©2018 IEEE 622
5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

recommendations network slicing. For example, according to C. Threat Model


NGMN, the Network Slice Manager, as well as the target This paper considers the possible threats to 5G enabled
host platforms cannot be trusted and should be supported by IoT service; which is based on three cryptological parameters:
mutual authentication. Our security architecture could be used authenticity of the user, confidentiality of the service request
to authenticate the user equipments (hosts) in the networks by the user, and integrity of the confidential user credentials.
they control on which the network slice instances are loaded. The threat models are illustrated as follows:
5G plays as a key factor to meet the increasing demands of Threat on authentication: There is a possibility of unau-
the (IoT) services. Which includes increased througput, huge thenticated attacker T rudy, who has the capability of moni-
coomunication between devices and low waiting time for the toring, intercepting, and impersonate as an authenticated user
response of the IoT, fog computing and network slicing. To equipment to send data through the 5G network. The possible
satisfy the rising demands of IoT services, network slicing attacks by the attacker are: Sybil, impersonation, identity-
and fog computing are considered together in service-oriented based attacks, etc.
5G architecture, but this opens up the door for a lot of
Threat to confidentiality: An adversary is an unauthorized
security threats like, user privacy, etc. In [25] Jianbing et al.
person who could access and understand the unauthorized
presented a privacy-preserving slice selection mechanism that
service-query or service-allocation in the path to 5G net-
would ensure fog nodes to select proper network slices based
work. Various possible passive attacks includes packet sniffing,
on different application requirements. However, a valid sim-
phishing, etc.
ulated result of the proposed service-oriented authentication
Threat to integrity: An attacker may have an attack on
is missing and proper designing of security algorithm is also
integrity; he could monitor the service-request/user-credentials
required to build secure communication between different user
in 5G and user equipment. The attacker may attempt to access
equipments and its specific IoT servers.
and alter the service before it reaches AMF of 5G network.
Numerous possible attacks include man-in-the-middle attack,
III. P ROPOSED S ECURITY P ROTOCOL session hijacking attack, etc
A. Attack Scenario
Table I: Notations used in security protocol
5G is becoming the integral part of IoT services. As
Acronym Description
Figure 1 depicts, there can be various types of services, such
U Eid ith User Equipment’s ID.
as M2M communication, Vehicular Communication, Mobile Ki ith User Equipment’s shared secret key.
Communication, available from a 5G enabled IoT network. rn2 ith AMF’s temporary key
A U ser − Equipment(Vehicle or Machine or Mobile) could Skey Generated key for authentication
e1/e2/e3 Encrypted by User Equipment’s shared secret key Ki
connect to 5Gnetwork through some Accessnetwork for h1/h2/h3/h4 Hash function applied for integrity of the data
availing various services from various IoT servers. Typically, rn
L Random number generated by the User Equipment
a user device requests for a service to Core Access and Mo- Bitwise XOR operation
k Concatenation operation
bility Management Function (AMF) which is the responsible H() One way hash function
for service allocation after the verification of Network Slice ServiceRequest The service requested by User Equipment
Selection Association Information NSSAI. UMD is responsi- A Variable to carry integrity and authentication of the message
E() Encryption Function
ble for authentication credential generation and subscription D() Decryption function
management. NSSF selects the set of network slice instances
serving users and determines the NSSAI corresponding to
applicable network slice instances. In an open environment
of access network, an intruder may eavesdrop the selected D. Proposed protocol
service and user credentials. The privacy of the User will The proposed security protocol shown in Figure 2 and the
be in stake. Further, an attacker may use the extracted data notations are illustrated in Table I. Assume n number of User
for impersonation and DoS attacks. Hence, There is a crucial Equipments associated with IoT services through 5G network
requirement of security protocol to preserve privacy along with having U E1 , U E2 , ...., U En .
confidentiality and integrity of the data exchanged. Step 1: Initially, a User Equipment U Ei sends its iden-
tification number U Eid and a random number rn obtained
B. Security Assumptions by it. It sends (U Eid, rn) to the Core Access and Mobility
Management Function (AMF) through the Access Network.
Real-world working assumptions for 5G enabled IoT sce-
The steps are as follows:
nario are follows:
Assumption 1:The encrypted service-request/user-credential RandomN o : rn
can only be decrypted by a shared symmetric-key, which was EquipmentID : U Eid
used for encryption. 1) U Ei → AM F :
Assumption 2: AMF is the full trusted party and physically {U Eid, rn}
secured.
Assumption 3: User equipment is also trusted party of the Step 2: AMF receives the pair (U Eid, rn) from the User
system; it is free from malware and not physically tampered. Equipment U Eid, it retrieves its shared symmetric key, Ki .
978-1-5386-6026-3/18/$31©2018 IEEE 623
5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

IoT
Servers

M-2-M
Communication 
SLICE 1 5G  CONTROL
PLANE
NETWORK
M-2-M
communication Attacker
AUSF NRF AUSF UDM PCF AF

Vehicular 
Services
ACCESS
SLICE 2 NETWORK
Vehicular
Communication
AMF SMF

SLICE 3
Mobile
Services
Mobile
Communication 

Figure 1: Attack Scenario for IoT enabled 5G Network

after that, AMF generates a random number for communicat- (rn, Skey) =L Dki (e1)
ing with the corresponding User Equipment U Eid. AMF also rn2 = Skey Ki
calculates the key Skey by bit-wise X-ORing the temporary e2 = Eki (rn, Skey)
key rn2 and secret key Ki . The AMF encrypts the generated h2 = H(Skey k e2 k rn)
key Skey with the UEid’s random number rn. Then, AMF if( e1 == e2 and h1 == h2 )
calculates a message digest for integrity using one way hash { Authenticated AMF }
function H() and generates the end message h1. AMF sends else { Terminate the protocol
the secret message e1 with message digest h1. The steps are and communication }
0

as follows: h2 = H(h1 k Skey k e2 k


rn)
0
3) U E → AM F : {h2 }

0
Step 4: AMF receives the h2 from User Equipment U Eid,
then checks equality of it with H(h1 k Skey k e1 k rn). If it
is true, then User Equipment U Eid is authenticated by AMF
and it sends the h3; Otherwise, then exits. The sequence of
Ki ← retrievekey(U Eid) steps are as follows:
RandomN o L : rn2 h3 = H(h1 k Skey k e1 k
Skey = rn2 Ki rn)
0
e1 = Eki (rn, Skey) if(h3 == h2 ) authenticated
h1 = H(Skey k e1 k rn) User Equipment U Eid
2) U Eid ← AM F : {e1, h1} 4) U E ← AM F : {h3}

Step 5: The authenticated User Equipment U Eid. The User


Equipment ciphers the ServiceRequest with secret key Ki and
evaluates the message integrity h4 by H(e3). After that, it
Step 3: The User Equipment U Eid gets {h1, e1} from the creates a variable A and assigns the result obtained by bit-
0

AMF and decrypts the encrypted message e1 with D(). The wise X-ORing h4 and h2 and transmits it along with e3. The
User Equipment then finds rn2 by X-ORing Skey and ki . sequence of steps are as follows:
It then generates its own version of secret message and its e3 = Eki (ServiceRequest)
corresponding hash values as e2 and h2, respectively. The User h4 = H(e3)
L 0
Equipment, U Eid then compares its created versions e2 with A = h4 h2
0 0
e1 and h2 with h1. If it finds that both e2 = e1 and h2 = h1 5) U Eid → AM F : {e3, A}
true, then it authenticates the AMF, otherwise it terminates the
protocol. The steps are given as follows:
978-1-5386-6026-3/18/$31©2018 IEEE 624
5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

Core Access and Mobility


User Equipment (UE)
Management Function (AMF)

RandomNo: rn
EquipmentID: UEid UE AMF: { AUid, rn }
Step 1

Ki Sharedkey (UEid)


RandomNo: rn2
Figure 3: Security Verification settings for the security protocol
Skey= rn2 ⊕ Ki
e1 = Eki (rn , Skey)
h1=H ( Skey || e1 || rn) Step 6: AMF obtains {e3, A}. Then it retrieves h4 from
UE AMF: { e1 ,h1} A by bit-wise X-ORing. Next, it evaluates its message di-
Step 2 gest for integrity check from e3. After that, it checks the
0
equality betweenh4 and h4 . If equal, then the encrypted
{ rn, Skey}= Dki (e1) ServiceRequest e3 is decrypted to obtain the Service Request.
rn2=Skey ⊕ Ki It then processes the ServiceRequest and sends back the results
e2 =Eki ( rn, Skey ) and acknowledgment to User Equipment U Eid. The steps
h2 =H( Skey || e2 || rn ) below depict the process:
If ( e1==e2 && h1==h2 )
L 0
h4 = A h2
0
Authenticate the AMF h4 = H(e3)
0
Else terminate if(h4 == h4) then integrity is
h2’ =H (h1 || Skey || e2 || preserved
rn) UE AMF: { h2’ } ServiceRequest = Dki (e3)
Step 3
execute the ServiceRequest
h3 = H(h1 || Skey || e1 || rn) 6) U E ← AM F : {Ack}
If ( h3 ==h2’ )
Authenticate UE The User Equipment U Eid can continue availing the IoT
Else terminate services till the session-time provided by 5G expires by
UE AMF: { h3 }
Step 4 following steps Five and Six in sequence.

e3 =Eki (ServiceRequest) IV. S IMULATION AND R ESULTS


h4 =H (e3) The Security protocol for the IoT enabled 5G is simu-
A= h4 ⊕ h2 lated using Scyther security testing environment with Security
UE AMF: { e3 , A } Protocol Description Language (.spdl). Figure 4 shows the
Step 5 results in the Scyther tool depicting the status and different
security claims with the setting depicted in Figure 3. The
h4 =A ⊕ h3
Scyther tool is used for authentication and secrecy tests.
h4’ =H(e3 )
Our security protocol is tested for Secrecy, Aliveness, Non-
If ( h4' ==h4 )
Injective Agreement, and Non-Inective Synchronization. The
Integrity preserved; Process
definition of the above security terms are provided in [28].
The ServiceRequest=Dki ( e3)
From the result, it is evident that our protocol is resistant
UE AMF: { Ack} to various attacks which could originate from Confidentiality,
Step 6 Integrity and Availability. The user-credentials and service-
requests are secretly communicated thereby preserving the
privacy.
Figure 2: Proposed protocol steps for IoT enabled 5G Network

978-1-5386-6026-3/18/$31©2018 IEEE 625


5th IEEE International Conference on Parallel, Distributed and Grid Computing(PDGC-2018), 20-22 Dec, 2018, Solan, India

[5] G. Intelligence, “Understanding 5g: Perspectives on future technological


advancements in mobile,” White paper, pp. 1–26, 2014.
[6] P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, “5g
wireless network slicing for embb, urllc, and mmtc: A communication-
theoretic view,” arXiv preprint arXiv:1804.05057, 2018.
[7] V. Pereira, T. Sousa, P. Mendes, and E. Monteiro, “Evaluation of
mobile communications: From voice calls to ubiquitous multimedia
group communications,” in Proc. Of the 2nd International Working
Conference on Performance Modeling and Evaluation of Heterogeneous
Networks, HET-NETs, vol. 4, pp. 4–10, 2004.
[8] G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz,
“A survey on 5g networks for the internet of things: Communication
technologies and challenges,” IEEE Access, vol. 6, pp. 3619–3647, 2018.
[9] I. F. Akyildiz, D. M. Gutierrez-Estevez, and E. C. Reyes, “The evolution
to 4g cellular systems: Lte-advanced,” Physical communication, vol. 3,
no. 4, pp. 217–244, 2010.
[10] X. Zhang, A. Kunz, and S. Schröder, “Overview of 5g security in 3gpp,”
in Standards for Communications and Networking (CSCN), 2017 IEEE
Conference on, pp. 181–186, IEEE, 2017.
[11] I. Woungang, S. K. Dhurandher, M. S. Obaidat, H.-C. Chao, and C. Liu,
“Trust-enhanced message security protocol for mobile ad hoc networks,”
in Communications (ICC), 2012 IEEE International Conference on,
pp. 988–992, IEEE, 2012.
[12] A. Ericsson, “Cellular networks for massive iot—enabling low power
wide area applications,” no. January, pp. 1–13, 2016.
[13] “MS Windows NT kernel description.”
https://machinaresearch.com/news/machina-research-predicts-10-
million-5g-internet-of-things-connections-in-2024/. Accessed: 2010-09-
30.
[14] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social internet of
things (siot)–when social networks meet the internet of things: Concept,
architecture and network characterization,” Computer networks, vol. 56,
no. 16, pp. 3594–3608, 2012.
[15] M. Leo, F. Battisti, M. Carli, and A. Neri, “A federated architecture
approach for internet of things security,” in Euro Med Telco Conference
(EMTC), 2014, pp. 1–5, IEEE, 2014.
[16] M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A critical analysis
Figure 4: Simulation results of the proposed protocol on the security concerns of internet of things (iot),” International Journal
of Computer Applications, vol. 111, no. 7, 2015.
[17] M. Abomhara and G. M. Køien, “Security and privacy in the internet
of things: Current status and open issues,” in Privacy and Security in
V. CONCLUSION AND FUTURE WORKS Mobile Systems (PRISMS), 2014 International Conference on, pp. 1–8,
IEEE, 2014.
The next generation IoT will require a lot of bandwidth [18] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things
to accommodate various services of ioT. 5G network would (iot) security: Current status, challenges and prospective measures,”
provide a great support of connectivity, mobility and fast- in Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for, pp. 336–341, IEEE, 2015.
communication to existing IoT services. Nevertheless, the [19] R. El Hattachi and J. Erfanian, “Ngmn 5g white paper,” NGMN Alliance,
security threat to it is inevitable. In this paper, we analyzed the February, 2015.
various IoT services through Access network and 5G network. [20] J. Qiao, X. S. Shen, J. W. Mark, Q. Shen, Y. He, and L. Lei, “En-
abling device-to-device communications in millimeter-wave 5g cellular
We depicted the threat to the user’s privacy and potential networks,” IEEE Communications Magazine, vol. 53, no. 1, pp. 209–
danger for further attacks. We proposed an Application layer 215, 2015.
efficient security protocol between User-Equipment and AMF [21] N. Alliance, “5g security recommendations package 2: Network slicing,”
2016.
of 5G network. The protocol is then tested with Scyther, a [22] Q. Li, G. Wu, A. Papathanassiou, and U. Mukherjee, “An end-to-end
formal verification tool. With which we preserved Secrecy, network slicing framework for 5g wireless communication systems,”
Aliveness, Non-Injective Agreement, and Non-Inective Syn- arXiv preprint arXiv:1608.00572, 2016.
[23] X. Zhou, R. Li, T. Chen, and H. Zhang, “Network slicing as a service:
chronization of the protocol. enabling enterprises’ own software-defined cellular networks,” IEEE
Communications Magazine, vol. 54, no. 7, pp. 146–153, 2016.
R EFERENCES [24] A. Ksentini and N. Nikaein, “Toward enforcing network slicing on ran:
Flexibility and resources abstraction,” IEEE Communications Magazine,
[1] C. Lin, J. Zhou, C. Guo, H. Song, G. Wu, and M. S. Obaidat, “Tsca: vol. 55, no. 6, pp. 102–108, 2017.
A temporal-spatial real-time charging scheduling algorithm for on- [25] J. Ni, X. Lin, and X. S. Shen, “Efficient and secure service-oriented
demand architecture in wireless rechargeable sensor networks,” IEEE authentication supporting network slicing for 5g-enabled iot,” IEEE
Transactions on Mobile Computing, vol. 17, no. 1, pp. 211–224, 2018. Journal on Selected Areas in Communications, vol. 36, no. 3, pp. 644–
[2] J. H. Park, M. S. Obaidat, and H.-C. Chao, “User experience and quality- 657, 2018.
of-service in internet of things: Practice and trends,” 2016. [26] F. Pan, H. Wen, H. Song, T. Jie, and L. Wang, “5g security architecture
[3] W. Ren, Y. Sun, T.-Y. Wu, and M. S. Obaidat, “A hash-based distributed and light weight security authentication,” pp. 94–98, IEEE, 2015.
storage strategy of flowtables in sdn-iot networks,” in GLOBECOM [27] J. M. Hamamreh, E. Basar, and H. Arslan, “Ofdm-subcarrier index
2017-2017 IEEE Global Communications Conference, pp. 1–7, IEEE, selection for enhancing security and reliability of 5g urllc services,”
2017. IEEE Access, vol. 5, pp. 25863–25875, 2017.
[4] P. V. Krishna, M. Obaidat, D. Nagaraju, and V. Saritha, “Chseo: [28] C. Cremers and S. Mauw, Operational Semantics and Verification of
An energy optimization approach for communication in the internet Security Protocols. Springer-Verlag Berlin Heidelberg, first ed., 2012.
of things,” in GLOBECOM 2017-2017 IEEE Global Communications
Conference, pp. 1–6, IEEE, 2017.

978-1-5386-6026-3/18/$31©2018 IEEE 626

Вам также может понравиться