Open Access Open Access  Restricted Access Subscription Access

Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments

Hsin-Nan Kuo,
Yu-Tse Shih,
Er-Shuo Zhuang,
Jheng-Jia Huang,
Chun-I Fan,

Abstract


Due to the rapid development of information technology, the demand for Internet services has gradually increased. With the advancement of the mobile telecommunications industry, people have relatively high expectations for the improvement of Internet speed and performance. Therefore, voice transmission technology must keep up with the speed of evolution. This evolution process is from 2G network that originally provided the data service business and can only satisfy the simple communication, SMS, and single function of the Internet, to the 3G network that can be processed in the multimedia form. In addition, to meet users' demand for wireless services and higher-speed voice calls, the mobile broadband network of 4G LTE has also evolved, and telecommunications providers further research into 5G networks with greater bandwidth and higher performance. However, the recent booming in IoT (Internet of Things) has also raised people's high dependence on information transmission, which has placed a heavy burden on the 5G network environment. For this concern, this paper combines the concept of Bacteria-inspired network with the feature that multiple devices can communicate with each other in the IoT environment, so that we can construct an environment with fast proxy authentications and a trustworthy file encryption protocol. The data transmission is no longer limited to having to pass through the base station, instead, the user can select the path for transmitting to be transmitted. However, each user must be legally authenticated with the base station in the 5G network environment, and it is difficult to prevent the malicious nodes in the transmission or the malicious behavior of specific people, so there are some worries about the security problems and performance. In response to this problem, this paper combined the concept of outsourcing computing with blind processing in the above project and built a set of outsourcing authentication mechanisms with both lightweight and blind data features, so that each device can transmit information to each other through a secure diffusion transmission pipeline, and we can ensure that the transmission node and data source are legitimate at the same time. Following the above results, our project can effectively reduce the burden on the base station to calculate and transmit information by ciphertext cutting, recombination and integration technologies with threshold fault tolerance. It is expected that the purpose of transmitting the information efficiently can be achieved and the overall service quality of the network environment will be improved.


Citation Format:
Hsin-Nan Kuo, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang, Chun-I Fan, "Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments," Communications of the CCISA, vol. 25, no. 4 , pp. 29-40, Nov. 2019.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office, No.1, Sec. 1, Shennong Rd., Yilan City, Yilan County 260, Taiwan (R.O.C.)
E-mail: ccisa.editor@gmail.com