Cited 2 time in
Design of Secure Authentication Handover Protocol for Innovative Mobile Multimedia Services in 5G MEC Environments
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Jiyoon | - |
| dc.contributor.author | Han, Dong-Guk | - |
| dc.contributor.author | You, Ilsun | - |
| dc.date.accessioned | 2023-01-03T07:48:01Z | - |
| dc.date.available | 2023-01-03T07:48:01Z | - |
| dc.date.issued | 2022-11 | - |
| dc.identifier.issn | 1607-9264 | - |
| dc.identifier.issn | 2079-4029 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/29880 | - |
| dc.description.abstract | 5G advanced technology has introduced innovative multimedia services, thus propelling the rise of the mobile multimedia market. While the ubiquity of mobile multimedia services has boosted customer convenience, it has also unlocked the way to possible security concerns that potentially damage users' privacy and service providers' properties. Several standards and researches have been proposed to counter these threats, notably those concentrating on authentication between users and service applications. Unfortunately, these studies are limited to address a new challenge, secure handover among distributed application functions in 5G Multi-access Edge Cloud (MEC) environments. Motivated by this, we present a handover authentication protocol with push-key and pull-key optimization options in 5G mobile multimedia application services. The proposed protocol provides mutual authentication, secure key exchange, confidentiality, and integrity. Furthermore, it also supports perfect forward secrecy, optimal handover, and anonymity, which were not previously considered in prior studies. While formal verification through BAN Logic and Scyther proved that the protocol is secure against attacks that violate the supported security requirements, comparative analysis of the proposed protocol against existing studies demonstrates that the protocol is simultaneously efficient. | - |
| dc.format.extent | 17 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | National Dong Hwa University | - |
| dc.title | Design of Secure Authentication Handover Protocol for Innovative Mobile Multimedia Services in 5G MEC Environments | - |
| dc.type | Article | - |
| dc.publisher.location | 대만 | - |
| dc.identifier.doi | 10.53106/160792642022112306008 | - |
| dc.identifier.scopusid | 2-s2.0-85144601425 | - |
| dc.identifier.wosid | 000891321800008 | - |
| dc.identifier.bibliographicCitation | Journal of Internet Technology, v.23, no.6, pp 1245 - 1261 | - |
| dc.citation.title | Journal of Internet Technology | - |
| dc.citation.volume | 23 | - |
| dc.citation.number | 6 | - |
| dc.citation.startPage | 1245 | - |
| dc.citation.endPage | 1261 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | VERIFICATION | - |
| dc.subject.keywordAuthor | Authentication | - |
| dc.subject.keywordAuthor | 5G | - |
| dc.subject.keywordAuthor | Handover | - |
| dc.subject.keywordAuthor | AKMA | - |
| dc.subject.keywordAuthor | Formal verification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
