首页> 外文期刊>Future generation computer systems >Efficient quantum-based security protocols for information sharing and data protection in 5G networks
【24h】

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

机译:用于5G网络中信息共享和数据保护的高效基于量子的安全协议

获取原文
获取原文并翻译 | 示例
           

摘要

Fifth generation (5G) networks aim at utilizing many promising communication technologies, such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a massive number of connected devices with 5G advanced technologies and innovating new techniques will surely bring tremendous challenges for trust, security and privacy. Therefore, secure mechanisms and protocols are required as the basis for 5G networks to address this security challenges and follow security-by-design but also security-by-operations rules. In this context, new efficient cryptographic protocols and mechanisms are needed in order to design and achieve information sharing and data protection protocols in 5G networks. In the literature, several security schemes based on unproven assumptions of computational complexity and mathematical models were proposed. However, the cryptanalysis is able to break most of the existing proposals in the presence of several weakest links in the designs. Recently, quantum walks (QWs) have been introduced as an excellent mechanism for generating cryptographic keys due to its nonlinear chaotic dynamical performance, high sensitivity to initial control parameters, stability and very large key space theoretically strong enough to resist various known attacks. This paper firstly proposes two efficient hash function mechanisms for 5G networks applications based on QWs, namely QWHF-1 and QWHF-2. Then, based on these hash functions, two efficient security protocols for securing data in 5G network scenario are proposed. Performance analyses and simulation results show that the proposed approaches are characterized with high security, efficiency, and robustness against several well-known attacks which nominate them as excellent candidates for securing 5G applications. (C) 2019 Elsevier B.V. All rights reserved.
机译:第五代(5G)网络旨在利用许多有前途的通信技术,例如云计算,网络切片和软件定义网络。通过5G先进技术支持大量互联设备并创新技术,无疑将给信任,安全和隐私带来巨大挑战。因此,需要安全的机制和协议作为5G网络的基础,以解决这一安全挑战并遵循按设计的安全性以及遵循按操作的安全性规则。在这种情况下,需要新的高效密码协议和机制来设计和实现5G网络中的信息共享和数据保护协议。在文献中,提出了几种基于未经证实的计算复杂性和数学模型假设的安全方案。但是,在设计中存在几个最薄弱的环节时,密码分析能够打破大多数现有建议。近年来,由于量子漫游(QW)的非线性混沌动态性能,对初始控制参数的高灵敏度,稳定性以及理论上足以抵御各种已知攻击的超大密钥空间,已被引入为生成加密密钥的出色机制。本文首先提出了两种基于QW的5G网络应用的有效哈希函数机制,即QWHF-1和QWHF-2。然后,基于这些哈希函数,提出了两种有效的安全协议,用于保护5G网络场景中的数据。性能分析和仿真结果表明,所提出的方法具有很高的安全性,效率和鲁棒性,可以抵御几种众所周知的攻击,这些攻击被提名为安全5G应用的优秀候选者。 (C)2019 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号