Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes. Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. arXiv:1708.04027 [cs], August, 2017. arXiv: 1708.04027
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [link]Paper  abstract   bibtex   
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authentication. We also provide a classification of countermeasures into three types of categories, including, cryptography methods, humans factors, and intrusion detection methods. The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. Based on the current survey, several recommendations for further research are discussed at the end of this paper.
@article{ferrag_security_2017,
	title = {Security for 4G and 5G {Cellular} {Networks}: {A} {Survey} of {Existing} {Authentication} and {Privacy}-preserving {Schemes}},
	shorttitle = {Security for 4G and 5G {Cellular} {Networks}},
	url = {http://arxiv.org/abs/1708.04027},
	abstract = {This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authentication. We also provide a classification of countermeasures into three types of categories, including, cryptography methods, humans factors, and intrusion detection methods. The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. Based on the current survey, several recommendations for further research are discussed at the end of this paper.},
	urldate = {2018-09-23TZ},
	journal = {arXiv:1708.04027 [cs]},
	author = {Ferrag, Mohamed Amine and Maglaras, Leandros and Argyriou, Antonios and Kosmanos, Dimitrios and Janicke, Helge},
	month = aug,
	year = {2017},
	note = {arXiv: 1708.04027},
	keywords = {⛔ No DOI found}
}

Downloads: 0