Font Size: a A A

Study On Heterogeneous Security Communication In 5G Network Slicings

Posted on:2019-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:L H ZhangFull Text:PDF
GTID:2428330572950160Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication technologies and Internet industries,humans enter the fifth generation mobile communication technology(5G)era.Compared with 3G,4G mobile communications,5G provides more abundant types of services,and also facilitates the development of a series of emerging industries,such as m Health,Internet of Vehicles and Smart Home.These industries will further promote the explosive growth of new applications for mobile network and bring infinite vitality to the future development of mobile communications.In order to provide various services,5G should have higher flexibility and greater plasticity to connect massive devices in mobile network to meet the diversified demands of multi-user groups.In order to satisfy various application scenarios and diverse service demands in the 5G era,network resources are divided into different slicings.The 5G slicing technology provides isolated network environments for different application scenarios through virtualized independent logic units.Network slicing can penetrate into all areas of communication systems,users can customize various services in different fields according to network functions and their own needs.Although the division of network functions and resources can reduce operating costs and enhance efficiency,the new architectures and technologies in 5G system also bring new challenges and threats to users' information security and privacy preservation.Network slicing is the key technology in 5G system,domestic and international scholars also attach great importance to its security issues.Firstly,based on 5G network slicing,this thesis applies the signcryption algorithm into two different public key cryptosystems,and gives the formal definition of heterogeneous signcryption and the corresponding security model.Meanwhile,this thesis proposes two heterogeneous signcryption schemes which can achieve mutual secure communications between two different public key cryptosystems.Besides,we prove the security of the proposed schemes in the random oracle model(ROM).Compared with the existing schemes,the new schemes achieve lower computational overhead and wider range of applications.Secondly,this thesis introduces 5G system architectures,and analyzes the establishment processes and technical methods of 5G network slicing in detail.Network slicing can provide end-to-end network solutions,and supply users with the required services and avoid unnecessary resource consumption.Therefore,the flexibility of network slicing is the core driving force for creating and expanding services.Finally,based on the above mutual heterogeneous signcryption schemes,we design an efficient authentication protocol between 5G network slicing heterogeneous systems.This protocol can be used for identity authentication and session key establishment.The security analysis shows that the new protocol not only meets the security features,such as anonymity,non-repudiation and fairness,but also can resist malicious attacks,such as tampering of message,replay attacks and denial of service(Do S)attacks.Afterwards,this thesis also sets up two heterogeneous cryptosystems on Raspberry Pis to simulate the mutual authentication between the client and the server in different public key environments,the result further validates the availability of the new protocol.In terms of communication efficiency,the proposed protocol reduces the computational overhead in the authentication process and decreases the resource consumption in the communication system,which is efficient and practical.Therefore,the new protocol is suitable for the scenarios of weak storage capacity and other resource-constrained scenarios.
Keywords/Search Tags:5G network slicing, public key cryptography, heterogeneous signcryption, mutual authentication, security communication
PDF Full Text Request
Related items