Font Size: a A A

Research On 5G Cross Layer Authentication Protocol Based On Channel Features

Posted on:2023-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y R SongFull Text:PDF
GTID:2558306914483484Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
Compared with the traditional communication network,5G network has higher security.However,there are still some security loopholes in the access authentication protocol,which is vulnerable to man-in-the-middle attack.Physical layer authentication technology makes use of the privacy and unforgeability of physical layer information,can better resist man-inthe-middle attack,and has better security performance.Thus,physical layer authentication can be used to improve the security of 5G access authentication protocol.This article presents a new classification of physical layer authentication technology,then introduces the research status and solutions of physical layer authentication based on fingerprint,watermark,physical layer key and cross layer authentication,and analyzes the advantages and disadvantages.Among them,cross layer authentication integrates physical layer information and upper layer authentication,which can obtain higher security benefits at a small cost of transformation.In this paper,the existing 5G authentication protocol is improved,and 5G cross layer authentication protocol based on threshold is proposed.The protocol mainly include three modules.First,the physical layer channel features are extracted.Second,the cross layer authentication response integrating the physical layer channel features is generated.Finally,the cross layer authentication response is pre-processed using threshold.In this paper,a simulation environment is built to test the function and performance of the proposed protocol.The test results show that the cross layer authentication protocol proposed in this paper can prevent man in the middle attack,and the authentication performance is better than the existing 5G standard authentication protocol.Based on different methods to pre-process the cross layer authentication response,5G cross layer authentication protocol based on machine learning is proposed.Function and performance tests show that the protocol also can prevent man in the middle attack,and the authentication performance is better than the existing 5G standard authentication protocol.After the security analysis of the two kinds of proposed 5G cross layer authentication protocol,they both have the security capabilities of preventing man in the middle attack,preventing replay attack and achieving two-way authentication.In the future,6G should have the characteristics of endogenous security.Physical layer authentication is realized based on the natural features of physical layer channel,which is perfectly fit for 6G endogenous security.This paper designs a physical layer authentication scheme suitable for future 6G network in the end and proposes that the physical layer authentication for future network should be intelligent,fast and elastic.
Keywords/Search Tags:wireless security, physical-layer security, 5G, cross-layer authentication
PDF Full Text Request
Related items