Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks
DOI:
https://doi.org/10.59543/ijmscs.v2i.9073Keywords:
5G, Decision-Making, Location-Tracking, PUF, SIM AuthenticationAbstract
The communication network would have potential uses dependent on the infrastructure once the fifth generation (5G) network is fully commercialized. Subscriber Identification Module (SIM) authentication is a well-known mechanism for safeguarding the confidentiality of wireless device users. Fifth-generation computer technologies are very advanced in certification based on geolocation, regular confirmation, and authentication mechanisms. The clonable authentication feature solves the issue of authentication using duplicate modules. In highly dynamic environments, the problem poses a risk to privacy protection, adaptiveness, self-organization, information leakage, and the reliability of services. The article introduces a 2-way identity authentication method (2WIAM) using a Physical Unclonable Function (PUF) to address the issue above. The suggested technique for detecting module clones depends on user-provided authentication and geolocation data. The 2-way mutual authentication used in the suggested technique is a clever way to combine the many wireless technologies accessible to a given network node and enable the creation of wireless on-demand service providers and networks. The initial stage involves immediate passcode authentication, and the second is verifying the identity of the mobile equipment and any shifts or copies in its physical position. A new-cross authentication is then carried out to determine the identity of the clone's physical counterpart. In prior authentication situations, the choice to provide authorization or ban the clone was made fairly and objectively. The experiment results show that the users' privacy is protected, enhanced adaptiveness and the amount of data lost is limited.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ali Darch Abed Dawar
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJMSCS is published Open Access under a Creative Commons CC-BY 4.0 license. Authors retain full copyright, with the first publication right granted to the journal.