Browsing by Author "Wang, Mingjun"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
- AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications
A4 Artikkeli konferenssijulkaisussa(2019) Wang, Mingjun; Yan, Zheng; Song, B.; Atiquzzaman, M.Device-to-Device (D2D) communication is proposed as a promising technology in 5G system for communications between mobile devices geographical proximity. Despite significant benefits, new application scenarios and system architecture, for instance, open direct channel, expose D2D communications to unique security threats. Providing a secure and privacy-preserving D2D communication system is essential for the success of D2D services. In this paper, we propose AAKA-D2D, an anonymous authentication and key agreement secure protocol for D2D communications, by which two User Equipments (UE) in close proximity could mutually authenticate without leaking their real identities and negotiate a session key for secure communications in D2D session without disclosing communication contents to Core Network (CN). Formal security analysis indicates that AAKA-D2D satisfies the security requirements. The comprehensive performance evaluation show that AAKA-D2D can increase the computational performance by about 20% and decrease on communication overhead by half compared to related works. © 2019 IEEE. - Is 5G Handover Secure and Private? A Survey
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2021-08-15) Zhao, Dongsheng; Yan, Zheng; Wang, Mingjun; Zhang, Peng; Song, BinThe next-generation mobile cellular communication and networking system (5G) is highly flexible and heterogeneous. It integrates different types of networks, such as 4G legacy networks, Internet of Things (IoT), vehicular ad hoc network (VANET), and wireless local access network (WLAN) to form a heterogeneous network. This easily results in continual vertical handovers between different networks. On the other hand, substantial deployment of small/micro base stations (BSs) brings frequent horizontal handovers within a network. The continual handovers among BSs and various networks expose mobile equipment (ME) to the risk of security and privacy threats. So far, many security and privacy mechanisms have been proposed to ensure secure handover either vertically or horizontally in 5G networks. Nevertheless, there still lacks a thorough survey to summarize recent advances and explore open issues although handover security and privacy are crucial to 5G. In this article, we summarize security and privacy requirements in handovers to resist potential attacks. Following these requirements as the evaluation criteria, we review secure and privacy-preserving handover schemes by categorizing them into two scenarios, i.e., vertical handover and horizontal handover. As for the vertical handover, we review related work from three classes, i.e., handovers within Third-Generation Partnership Project (3GPP) networks, between 3GPP and non-3GPP networks, and between non-3GPP networks. Concerning horizontal handovers, we review related work from two classes, i.e., intramobile service controller (MSC) and inter-MSC handover. Meanwhile, we analyze and compare the technical means and performance of these works in order to uncover open issues and inspire future research directions. - Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2022) Zhang, Jialei; Yan, Zheng; Fei, Shufan; Wang, Mingjun; Li, Tieyan; Wang, HaiguangMobile and wireless communication continues its rapid development. Beyond 5G, heterogeneous networks (HetNets) will be merged with the integration of various networking technologies. Unique characteristics of such an integrated converged network cause new security challenges, such as difficulty of key agreement and theft of communication content, especially when crossing network domains happens. In order to ensure secure and reliable communications, end-to-end (E2E) communication security is highly expected, especially for cross-trust-domain communications in HetNets. Unfortunately, little existing research touches this issue and the literature lacks a deep-insight review on the current state-of-the-art. In this article, we summarize current E2E secure communication scenarios and basic techniques. We propose a number of requirements based on security threat analysis and employ them as a measure to evaluate existing works. Through review and analysis, we finally determine open issues to highlight future research directions. - Privacy-preserving authentication and key agreement protocols for D2D group communications
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2018-08-01) Wang, Mingjun; Yan, ZhengDevice-to-Device (D2D) communications play a key role in the next generation mobile communication networks and wireless systems (5G) and the Internet of Things ecosystem. D2D group communications are significant for group based services. In spite of its benefits, new application scenarios and new system architecture expose the D2D group communications to unique security threats. Although there are numerous studies on security and privacy in two-user D2D communications, a lack of solutions on secure and privacy-preserving D2D group communications would restrict their wide usage. In this paper, we propose two privacy-preserving authentication and key Agreement protocols (PPAKA-HAMC and PPAKA-IBS) to guarantee secure and anonymous D2D group communications. In our protocols, a group of D2D users mutually authenticate with each other without leaking their identity information while negotiate a common D2D group session key for secure communications in a D2D session. Formal security analysis and comprehensive performance evaluation show security and effectivity of our protocols. - Secure Pervasive Social Communications Based on Trust in a Distributed Way
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2017-01) Huang, Chaoyin; Yan, Zheng; Li, Ning; Wang, MingjunSocial network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive social communications becomes important. However, a solution based on a centralized server could be inapplicable in some specific situations (e.g., disasters and military activities) and suffers from DoS/DDoS attacks and internal attacks. How to automatically control data access in a trustworthy and efficient way in PSN is a challenge. In this paper, we propose two schemes to secure communication data in PSN purely based on local trust evaluated by PSN nodes in a distributed manner. Each node can control its data based on its trust in other nodes by applying attribute-based encryption. The advantages, security, and performance of the proposed scheme are evaluated and justified through serious analysis and implementation. The results show the efficiency and effectiveness of the schemes. In addition, we developed a mobile app based on Android platform to demonstrate the applicability and social acceptance of our schemes. - Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2018-09) Li, Ning; Yan, Zheng; Wang, Mingjun; Yang, Laurence T.Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at any time and anywhere. In order to protect crucial social activities, ensure communication dependability, and enhance user privacy, securing pervasive social communications becomes especially important. However, neither centralized nor distributed solutions can protect PSN communications as expected. How to automatically control data access in a trustworthy and efficient way is an important security issue. In this article, we propose a scheme to guarantee communication data security in PSN based on two dimensions of trust in a flexible manner on the basis of Key-Policy Attribute-Based Encryption (KP-ABE). Its advantages and performance are justified and evaluated through extensive analysis on security, computation complexity, communication cost, scalability, and flexibility, as well as scheme implementation. In addition, we develop a demo system based on Android mobile devices to test our scheme in practice. The results demonstrate its efficiency and effectiveness. Comparison with our previous work based on CP-ABE (Yan and Wang 2017) further shows its feasibility to be applied to PSN. - Trusted Network Slicing among Multiple Mobile Network Operators
A4 Artikkeli konferenssijulkaisussa(2020-12) Muhammad, Yousuf; Yan, Zheng; Wang, Mingjun; Khan, F.5G mobile networks are expected to be much bigger in size, faster in speeds and better in scalability, providing varied services to different users and businesses in contrast to previous networks. 5G will also help enabling new business models and use cases. 'Network Slicing' is a driving architectural concept for multi-tenancy. Network Slicing enables Mobile Network Operators (MNOs) to deploy different services over shared physical infrastructure, increasing inter-operator resource sharing. As 5G is still in its nascent, inter operator cooperation is an area that requires immediate attention of research. Traditional inter operator trust relationship models cannot fully comprehend the needs of 5G networks. In this paper, we propose an Intel SGX based multi-MNO cooperation scheme for trusted, dynamic and efficient network slice sharing in order to support inter-operator trustworthy collaboration. Furthermore, we developed a Proof of Concept of our proposed scheme using Intel SGX, flask framework and Docker containers. The obtained results indicate the applicability of the proposed scheme with little effect on performance.