Implementation of Secured Server less Communication Scheme for Virtual Systems in 5G Cloud Networks
-
Published:2022-09-28
Issue:25
Volume:
Page:5-18
-
ISSN:2394-8280
-
Container-title:International Journal of Research In Science & Engineering
-
language:en
-
Short-container-title:IJRISE
Author:
Logeshwaran J.,Kiruthiga T.
Abstract
The emergence of virtualization in 5G cloud computing networks puts it at greater risk of cyber-attacks, with a major reliance on the communication between virtual systems. To address these concerns, this paper proposes a secure serverless communication scheme for virtual systems in 5G cloud networks. A system with two roles, sender and receiver, is used to exchange control messages with the sender being responsible for authentication and encryption while the receiver being responsible for decryption and validation. To ensure secure and reliable communication, the proposed scheme uses the Elliptic Curve Cryptography (ECC) method, along with a proposal of a symmetric cryptographic algorithm called AES-CTR. In addition, the proposed scheme also includes a distributed identity base approach to prevent replay and man-in-the-middle attacks. Simulation results demonstrate that the proposed scheme can securely and reliably transfer data between virtual systems in 5G cloud networks and achieve higher efficiency in terms of security as compared to existing schemes. Additionally, the proposed scheme is verified in an NS-3 simulation framework
Reference40 articles.
1. Park, J. H., Rathore, S., Singh, S. K., Salim, M. M., Azzaoui, A. E., Kim, T. W., ... & Park, J. H. (2021). A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions. Hum.-Centric Comput. Inf. Sci, 11(3). 2. Porambage, P., Miche, Y., Kalliola, A., Liyanage, M., & Ylianttila, M. (2019, October). Secure keying scheme for network slicing in 5G architecture. In 2019 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 1-6). IEEE. 3. Tayyaba, S. K., Khattak, H. A., Almogren, A., Shah, M. A., Din, I. U., Alkhalifa, I., & Guizani, M. (2020). 5G vehicular network resource management for improving radio access through machine learning. IEEE Access, 8, 6792-6800. 4. Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Blockchain for 5G and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166, 102693. 5. Khan, R., Kumar, P., Jayakody, D. N. K., & Liyanage, M. (2019). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials, 22(1), 196-248.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Real-Time Edge Computing Services for Internet of Things-based Cloud Networks;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15 2. Assessing the Vulnerability of Information Security Models to Malware in Networked Applications;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15 3. Unsupervised Classification of Wetland Areas Using Hyper Spectral Imagery;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15 4. Improving Diagnostics for Brain Cancer: An Application of Deep Learning;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15 5. Implementing Image Colorization with Generative Adversarial Networks;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
|
|