Blockchain-Based Mobility Management for LTE and Beyond
If LTE has made it possible to stream music and video over mobile devices such as smartphones and tablets, 5G will enable vehicles, sensors, and other countless devices to interact and share data over the cellular network. To unleash the full potential of 5G, it is imperative to address the shortcomings of LTE in regard to mobility management. One major challenge with LTE is improving the handover performance and security. In order to enhance the performance and security of the handover process, this paper introduces an approach using blockchain for key derivation and key sharing. This novel approach, Blockchain Key Derivation Function (BKDF), ensures tighter security as well as faster handover between the base stations. With blockchain adding an extra layer of security, the network is able to securely derive the handover key and share it with the base stations and mobile devices in the pre-handover phase, which significantly reduces the number of operations required during the intra-handover phase. A formal security analysis on BKDF is conducted with the Burrows-Abadi-Needham (BAN) logic, followed by an analysis on the effectiveness of BKDF against some of the well-known types of network attacks. The simulation results confirm that BKDF reduces handover latency and improves link stability with decrease in packet loss in the intra-handover phase.
KeywordsHandover Blockchain Security LTE 5G
We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of 2018-T1-001-092.
- 1.Duan, X., Wang, X.: Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In: IEEE ICC 2016 Communication and Information Systems Security Symposium (2016)Google Scholar
- 3.Tesema, F.B., Awada, A., Viering, I., Simsek, M., Fettweis, G.P.: Fast cell select for mobility robustness in intra-frequency 5G ultra dense networks. In: IEEE 27th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–7 (2016)Google Scholar
- 5.Habbal, A., Member, S., Goudar, S.I., Hassan, S., Member, S.: Context-aware radio access technology selection in 5G ultra dense networks. IEEE Access 14(8), 1–13 (2017)Google Scholar
- 6.Wang, X., et al.: Handover reduction in virtualized cloud radio access networks using TWDM-PON fronthaul. J. Opt. Soc. Am. 8(12), 124–134 (2016)Google Scholar
- 7.Jung, M.Y., Jang, J.W.: Data management and searching system and method to provide increased security for IoT platform. In: International Conference on Information and Communication Technology. ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017, December 2017, pp. 873–878 (2017)Google Scholar
- 8.Ram Basnet, S., Shakya, S.: BSS: blockchain security over software defined network. In: IEEE ICCCA, pp. 720–725 (2017)Google Scholar
- 9.Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communication Technology, ICACT, pp. 464–467 (2017)Google Scholar
- 10.Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
- 11.Rao, V.S., Gajula, R.: Interoperable UE Handovers in LTE. Radysis (2011)Google Scholar
- 12.Secp256k1. https://en.bitcoin.it/wiki/Secp256k1. Accessed 02 May 2018
- 14.Jawad Alam, M., Ma, M.: DC and CoMP authentication in LTE-advanced 5G HetNet. In: Proceedings of IEEE Global Communications Conference, GLOBECOM 2017, January 2018, pp. 1–6 (2018)Google Scholar
- 16.Cichonski, J., Franklin, J.M., Bartock, M.: Guide to LTE Security. NIST Special Publication 800-187 (2018)Google Scholar