skip to main content
10.1145/3582935.3583053acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

Multi-Feature Fusion Identity Generation Method for Fixed Location 5G Terminal Devices

Published: 10 April 2023 Publication History

Abstract

While 5G is developing rapidly, it also faces greater security threats, and achieving reliable terminal identification is a prerequisite for ensuring 5G network security. For the identity reliability problems of the accessed fixed location 5G terminal devices, a multi-feature fusion identity generation method is proposed. Firstly, the channel feature sequence that can reflect the location information of 5G terminal devices is obtained at the base station side based on Sounding reference signal; then the envelope information of the intercepted leading signal is extracted at the base station side using the method of envelope detection in communication reconnaissance to obtain the estimated time width of the leading signal; finally, a multi-feature fusion identity generation method is proposed by combining the permanent identifier SUbscription Permanent Identifier that represents the terminal identity. The study shows that the key authentication based on the fusion of multiple features improves the identification security significantly compared with the key authentication based on the single feature identity, and is also more reliable than other terminal authentication techniques.

References

[1]
CHEN C M, XIANG B, LIU Y, A secure authentication protocol for Internet of vehicles[J]. IEEE Access, 2019, 7: 12047-12057.
[2]
NIU J Y. Analysis of the security mechanism in mobile communication system[D]. Beijing: Beijing University of Posts and Telecommunications, 2008.
[3]
ZHANG L. Key technology research on GSM/UMTS hybrid network security[D]. Beijing: Beijing University of Posts and Telecommunications, 2011.
[4]
CHANG C C, LEE J S, CHANG Y F. Efficient authentication protocols of GSM[J]. Computer Communications, 2005, 28(8): 921-928.
[5]
NTANTOGIAN C, XENAKIS C. One-pass EAP-AKA authentication in 3G-WLAN integrated networks[J]. Wireless personal communications, 2009, 48(4): 569-584.
[6]
XIANG D N, MAO W J. Research and improvement of LTE EPS-AKA procedure security[J]. Radio Communication Technology, 2016, 42(5): 60-63.
[7]
FERRAG M A, MAGLARAS L, ARGYRIOU A, Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes[J]. Journal of Network and Computer Applications, 2018, 101: 55-82.
[8]
HU X X, LIU C X, LIU S X, Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018, 4(12): 5-19.
[9]
PRASAD A R, ARUMUGAM S, SHEEBA B, 3GPP 5G security[J]. Journal of ICT Standardization, 2018, 6(1): 137-158.
[10]
BASIN D, DREIER J, HIRSCHI L, A formal analysis of 5G authentication[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM: 2018: 1383-1396.
[11]
HUANG K Z, JIN L, ZHONG Z. 5G physical layer security technology: enhancing security by communication[J]. ZTE Technology Journal, 2019, 25(4): 43-49.
[12]
PAUL L Y, BARAS J S, SADLER B M. Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 38-51.
[13]
WANG X, HAO P, HANZO L. Physical-layer authentication for wireless security enhancement: current challenges and future developments[J]. IEEE Communications Magazine, 2016, 54(6): 152-158.
[14]
YANG H J, ZHOU T Q, GUI Z Y. Blockchain technology for identity authentication in Internet of things[J]. ZTE Technology Journal, 2018, 24(6): 39-44.
[15]
HAMMI M T, HAMMI B, BELLOT P, Bubbles of trust: a decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018, 78: 126-142.
[16]
LIN C, HE D, HUANG X, BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018, 116: 42-52.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICITEE '22: Proceedings of the 5th International Conference on Information Technologies and Electrical Engineering
November 2022
739 pages
ISBN:9781450396806
DOI:10.1145/3582935
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Envelope information
  2. Fixed location 5G terminal devices
  3. Multi-feature fusion
  4. Terminal identification

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Science and technology project of State Grid Corporation of China: Research on Multi-access Edge Computing (MEC) Security Technology Adaptive to 5G Power Network

Conference

ICITEE 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 14
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media