978-1-7281-6264-5/20/$31.00 ©2020 IEEE Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks Vincent Omollo Nyangaresi Faculty of Biological & Physical Sciences Tom Mboya University College Homabay, Kenya. vnyangaresi@tmuc.ac.ke Anthony Joachim Rodrigues School of Informatics & Innovative Systems JOOUST Kisumu, Kenya tonyr@jooust.ac.ke Silvance Onyango Abeka School of Informatics & Innovative Systems JOOUST Kisumu, Kenya silvancea@gmail.com AbstractSmart grids improve the management of various power network components as well as the monitoring of power flows. Their deployments require very fast communication channels, which can be facilitated by 5G networks. However, 5G’s ultra-densification boost system capacity and spectrum efficiency but introduce vulnerabilities due to the incorporation of many wireless network technologies and devices. The conventional 5G handover authentication protocols have security challenges that expose them to attacks such as message replay. As such, many authentication protocols have been proposed to secure smart grid data transmission. However, these protocols are unreliable in attacks detection and prevention, energy inefficient, have high latencies, heavy communication as well as computational overheads. In this paper, a 5G key management and handover protocol is developed to address some of these security and performance issues. The simulation results show that the proposed protocol preserves perfect forward key secrecy, is robust against de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS) and jamming attacks. Performance analysis showed that it has low communication overheads, space complexity and handover authentication latencies. Compared with 3GPP R16, the proposed protocol showed a 25% and 42.9% improvement in communication overheads and space complexity respectively. Keywords—Smart grid, handover authentication, latency, security I. INTRODUCTION The incorporation of new technologies such as software defined network (SDN), network function virtualization (NFV) and network slicing, together with network densification introduce many security issues in 5G networks. The small sized cells imply frequent handovers [1], making efficient mobility management [2], seamless and secure handovers a necessity [3]. In addition, the integration of new wireless components such as hotspots that are vulnerable to attacks renders the entire 5G network susceptible. As pointed out in [2] cloud computing and SDN increase risks of distributed denial of services (DDoS) attacks. As such, compared with 2G, 3G and long term evolution (LTE), security requirements in 5G networks are higher [4]. In 5G networks, 3rd Generation Partnership Project (3GPP) committee has specified three types of handovers, which include intra new radio (NR), inter-3GPP and that between 3GPP and untrusted non-3GPP [5]. For handover authentication, 5G’s improved Authentication and Key Agreement (5G-AKA’) is employed. Unfortunately, 5G-AKA’ protocol has many security flaws rendering it susceptible to attacks such as jamming, de-synchronization, replay attacks and lack of perfect forward secrecy[6][7]. In spite of this, it is revealed in [1] that security and privacy issues in 5G have not received much attention. As such, authors in [8] point out security and privacy issues such as authentication, encryption, key and identity management, secure storage and mobility are open challenges in 5G. To address some of these challenges, new handover authentication schemes based on techniques such as chameleon hashing [9], pairing-based cryptography [10], pairing-free identity cryptographic methods [11], and anonymous handover authentication with conditional privacy preservation [12] have been proposed. However, these schemes have their own architectures that are different from 5G or LTE network [13], making their implementation in these networks uneconomic and unfeasible due to the required changes to the underlying network. In addition, the bilinear pairing operations in [10] and [11] are computationally intensive, hence cannot satisfy 5G networks’ stringent delay requirements [2]. A research by [4] pointed out that a faster, safer and effective key management and handover protocol that ensures privacy protection and validation is crucial for 5G advancements. This calls for the development of efficient protocols to ensure faster end devices authentication in 5G networks [2]. As such, in this paper, an Artificial Neuro-Network-Fuzzy Logic (ANN-FL) based handover authentication protocol for ultra dense 5G networks is proposed. Our contributions include the following: I. We develop a multi-criteria handover protocol that is shown to reduce the number of executed handovers in 5G networks hence a reduction in associated attacks. II. The proposed protocol uses ANN-FL technique to optimize the selection of the target cell prior to the actual handover, reducing handover delays. III. We introduce the shared keys ψ and ƺ to secure the link between source 5G NR NodeB (gNB) and target gNB, and the link between Access and Mobility management Function (AMF) and User Equipment (UE) respectively. IV. We encapsulate and encrypt the session keys used during handover to thwart eavesdropping and other associated attacks. The rest of this paper is organized as follows: Section II discusses related work while Section III outlines the system model of our protocol. Section IV presents results and 2020 2nd Global Power, Energy and Communication Conference (IEEE GPECOM2020), October 20-23, 2020, Online Conference 339 Authorized licensed use limited to: Jaramogi Oginga Odinga University of Science & Technology. Downloaded on October 15,2021 at 13:16:32 UTC from IEEE Xplore. Restrictions apply.