Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

Adnan Shahid, Khan and Yasir, Javed and Rashad Mahmood, Saqib and Zeeshan, Ahmad and Johari, Abdullah and Kartinah, Zen and Irshad, Ahmed Abbasi and Nayeem, Khan (2022) Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks. IEEE ACCESS, 10 (1). pp. 31273-31288. ISSN 2169-3536

[img] PDF
Lightweight Multifactor - Copy.pdf

Download (199kB)
Official URL: https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?pu...

Abstract

With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires each device to act as intelligent transmission relays. Inclusion of such intelligence relays and support of quantum computing at D2D may compromise existing security mechanisms and may lead towards primitive attacks such as impersonation attack, rouge device attack, replay attack, MITM attack, and DoS attack. Thus, an effective yet lightweight security scheme is required that can support existing low computation devices and can address the challenges that 5G/6G poses. This paper proposes a Lightweight ECC (elliptic curve cryptography)-based Multifactor Authentication Protocol (LEMAP) for miniaturized mobile devices. LEMAP is the extension of our previous published work TLwS (trust-based lightweight security scheme) which utilizes ECC with Elgamal for achieving lightweight security protocol, confidentiality, integrity, and non-repudiation. Multi-factor Authentication is based on OTP (Biometrics, random number), timestamp, challenge, and password. This scheme has mitigated the above-mentioned attacks with significantly lower computation cost, communication cost, and authentication overhead. We have proven the correctness of the scheme using widely accepted Burrows-Abadi-Needham (BAN) logic and analyzed the performance of the scheme by using a simulator. The security analysis of the scheme has been conducted using the Discrete Logarithm Problem to verify any quantum attack possibility. The proposed scheme works well for 5G/6G cellular networks for single and multihop scenarios

Item Type: Article
Additional Information: Information, Communication and Creative Technology
Uncontrolled Keywords: Multifactor authentication, LEMAP, D2D communication, 6G, BAN (BAN Logic), Elgamal.
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Academic Faculties, Institutes and Centres > Faculty of Computer Science and Information Technology
Depositing User: Khan
Date Deposited: 30 Mar 2022 00:00
Last Modified: 09 Aug 2022 07:41
URI: http://ir.unimas.my/id/eprint/38195

Actions (For repository members only: login required)

View Item View Item