Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. HIGHLY SECURE AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR BLOCKCHAIN ASSIMILATED 5G COMMUNICATION NETWORKS
    Bhuvaneshwari G1, Bhalaji N2, Beulah Jayakumari R3, Murugesan S4, Suganya A5, Subashini K6
    Journal of Data Acquisition and Processing, 2023, 38 (1): 4644-4653 . 

    Abstract

    The evolution of every communication standard provides high connectivity among the communication devices.5G and other beyond technologies are being designed to catering diverse requirements of use cases. To realize such features of 5G and beyond technologies, we need to rethink how the current cellular networks are designed and established. Because, the radio communications and spectrum utilizations are not enough. Several technologies such as Software Defined Networking (SDN), Network Function Virtualization (NFV), Machine Learning, and Cloud Computing are currently used to establish the 5G communication technology. Also, it creates some challenges such as decentralization, transparency, interoperability, privacy, and security. To address these issues, we can integrate Blockchain into 5G. Because Blockchain has the features such as transparency, immutability, encryption and distributed environment. Even though blockchain provides a secure and reliable communication, there are some possible attacks such as Denial of Service (DoS), Eavesdropping, Man in the Middle (MitM) and jamming. We designed a secure authentication protocol which eradicates the above-mentioned attacks. It performs mining process, verify the timestamp and aggregate the transaction. It reduces the communication overhead and computation time. Our security analysis illustrates that the proposed scheme is secure and resists the known attacks such as DoS, DDoS, MitM, hijacking and compromising attacks.

    Keyword

    Blockchain,5G, SDN, Cloud RAN,5G, DoS, DDoS, Hijacking, Jamming, AKA, Authentication


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved