Securing 5G Het Nets in SDN Using Authentication
Monica Murlidhar Jagtap1, S. Renuka Devi2

1Monica Murlidhar Jagtap, School of computing science and engineering, Vellore Institute of Technology, Chennai, (Tamil Nadu), India.
2S. Renuka Devi, School of computing science and engineering, Vellore Institute of Technology, Chennai, (Tamil Nadu), India.

Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 1297-1303 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7058068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Fifth generation (5G) networks are highly heterogeneous with security being prime concern. 5G is based on Wireless Network Virtualization (WNV). A software-defined network (SDN) is used to realize WNV. SDN typically is capable of solving the requirement of a large number of devices in ultra-dense 5G architecture. However, SDN is divided into three planes, namely, application, control and data plane which are vulnerable to attacks. Programming of SDN takes place at control plane. Hence, attack at the control plane becomes single point of failure. This makes it mandatory to provide authentication at the time of bandwidth allocation to prevent spoofing type of attacks. Radio Frequency (RF) channel characteristics vary in accordance with practical conditions in random manner. This can be considered as advantageous while establishing authentication procedures. The same can be used for preventing the probability of prediction for spoofing. The paper proposes a novel approach for authenticating user equipment (UE) with strategy of full and fast authentication procedures which is based on context information (CI). This in turn is Cyclic Redundancy Check (CRC) authenticated to provide multilevel security. Mininet emulation tool is used for SDN emulation and the performance is evaluated. The results show improvements in authentication along with negligible additional latency during communication.
Keyword: 5G Networks, Wireless Network Virtualization, Software-defined networks, channel characteristics, Context information, CRC based authentication, latency.
Scope of the Article: Data Visualization using IoT.