{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:02:14Z","timestamp":1742616134666,"version":"3.40.2"},"reference-count":26,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003","61401510","61501516"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Communications"],"published-print":{"date-parts":[[2019,1]]},"abstract":"Existing handover authentication schemes are implemented in the upper layer through cryptographic techniques with different protocols and parameters involved under different handover scenarios, introducing high latency and complexity especially in the next generation (5G) highly heterogeneous network (HetNet). The authors propose to introduce wireless link signatures decided by users' locations as handover authentication data to achieve unified and fast handover authentication at the physical layer in 5G software defined networking\u2010based HetNet. Specifically, the unique wireless channel characteristics between a user and the serving access point (AP) are extracted as the secure context information (SCI) and transferred to the target AP. The latter determines whether the user is the legitimate one who has already been authenticated according to the received SCI. They then analyse the authentication performance relating to multiple attributes and results demonstrate that the authentication strength can be adaptively adjusted. Furthermore, they find that optimum performance can be achieved by setting a proper decision threshold and derive the sub\u2010optimal performance by iterative search. Lastly, analysis and simulations on latency and overhead compared with existing ones are conducted and results prove the effectiveness of the proposed scheme.<\/jats:p>","DOI":"10.1049\/iet-com.2018.5405","type":"journal-article","created":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T00:18:09Z","timestamp":1537057089000},"page":"144-152","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Unified and fast handover authentication based on link signatures in 5G SDN\u2010based HetNet"],"prefix":"10.1049","volume":"13","author":[{"given":"Jing","family":"Yang","sequence":"first","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"}]},{"given":"Xinsheng","family":"Ji","sequence":"additional","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"},{"name":"National Mobile Communications Research Laboratory Southeast University Nan Jing 211189 People's Republic of China"}]},{"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"}]},{"given":"Yajun","family":"Chen","sequence":"additional","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"}]},{"given":"Xiaoming","family":"Xu","sequence":"additional","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"}]},{"given":"Ming","family":"Yi","sequence":"additional","affiliation":[{"name":"China National Digital Switching System Engineering and Technological R&D Center Zheng Zhou 450002 People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2019,1]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461199"},{"key":"e_1_2_7_5_1","unstructured":"3GPP TS 33.401 V11.5.0. 3rd Generation Partnership Project: \u2018Technical Specification Group Service and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture\u2019 2012"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"Nguyen\u2010DucT. KamiokaE.: \u2018Feasibility of SDN\u2010based vertical handover between bluetooth and wi\u2010fi\u2019. IEEE Int. Conf. on Communications Management and Telecommunications DaNang Vietnam December2015 pp.24\u201329","DOI":"10.1109\/ComManTel.2015.7394254"},{"issue":"2018","key":"e_1_2_7_7_1","first-page":"55","article-title":"Security for 4G and 5G cellular networks: A survey of existing authentication and privacy\u2010preserving schemes","volume":"101","author":"Ferrag M.A.","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269714"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"ZhangC. LuR. HoP.H.et al.: \u2018A location privacy preserving authentication scheme in vehicular networks\u2019. Wireless Communications and Networking Conf. Las Vegas Nevada 2008 pp.2543\u20132548","DOI":"10.1109\/WCNC.2008.447"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.110811.111240"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2469602"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/9780470545287","volume-title":"Microwave mobile communications","author":"Jakes W.C.","year":"1994"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.189"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17020289"},{"key":"e_1_2_7_17_1","unstructured":"WuX. YangZ. LingC.et al.: \u2018A physical\u2010layer authentication assisted scheme for enhancing 3GPP authentication\u2019 arXiv preprint arXiv:1502.07565 2015"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"DaiC. YangJ. QinY.et al.: \u2018Physical layer authentication algorithm based on SVM\u2019. IEEE Int. Conf. on Computer and Communications Chengdu China October2017 pp.1597\u20131601","DOI":"10.1109\/CompComm.2016.7924970"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498103"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"DuanX. WangX.: \u2018Fast authentication in 5G HetNet through SDN enabled weighted secure\u2010context\u2010information transfer\u2019. IEEE Int. Conf. on Communications Kuala Lumpur Malaysia May2016 pp.1\u20136","DOI":"10.1109\/ICC.2016.7510994"},{"key":"e_1_2_7_21_1","doi-asserted-by":"crossref","unstructured":"MaT. HuF. MaM.: \u2018Fast and efficient physical layer authentication for 5G HetNet handover\u2019. Int. Telecommunication Networks and Applications Conf. Melbourne Australia December2017 pp.1\u20133","DOI":"10.1109\/ATNAC.2017.8215379"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2744672"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081072"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0841-8"},{"volume-title":"Fading dispersive communication channels","year":"1969","author":"Kennedy R.S.","key":"e_1_2_7_25_1"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1970.1054448"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2052253"}],"container-title":["IET Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2018.5405","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-com.2018.5405","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-com.2018.5405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T03:45:01Z","timestamp":1742528701000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/iet-com.2018.5405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1049\/iet-com.2018.5405"],"URL":"https:\/\/doi.org\/10.1049\/iet-com.2018.5405","archive":["Portico"],"relation":{},"ISSN":["1751-8628","1751-8636"],"issn-type":[{"type":"print","value":"1751-8628"},{"type":"electronic","value":"1751-8636"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2017-08-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}