Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3282
Title: A Secure Key Management and Authentication Protocol for Virtualized-BBU in C-RAN Architecture
Authors: Yadav, Awaneesh Kumar
Mahapatra, Byomakesh
Turuk, Ashok Kumar
Keywords: C-RAN
Combinatorial design
Network Security
Resiliency
VB
V-BBU
Issue Date: Mar-2019
Citation: International Conference on Vision Towards Emerging Trends in Communication and Networking (VITECON 2019) Vellore, India, 30-31 March 2019
Abstract: The centralization and virtualization of baseband unit (BBU) in cloud radio access network (C-RAN) make the BS platform more scalable and flexible. The C-RAN is a next-generation collaborative RAN architecture develop using cloud computing and virtualization technology. C-RAN provide different radio services over a single platform. In comparison to the traditional BS, the architect of C-RAN has two distinct parts, i.e., a centralized Control Unit (CU) and a distributed unit (DU) known as Remote Radio Head (RRH). The RRH handles the end-user whereas the BBU unit performs the signal processing and controlling activity. The virtualized BBU consist of a set of virtual box (VB) managed by a virtual baseband manger (VBM) or hypervisor. As all the VB growth over a single virtualized BS platform, there is a chance of violation security principle such as data integrity, confidentiality and availability at the BBU. In this paper, we have proposed an authentication protocol to secure and independent operation of VB in a BBUpool. The proposed protocol use Steiner Triple System (STS) and combinatorialdesignmethodsforcrucialpre-shareddistribution. The proposed protocol simulated with Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The resiliency of V-BBU is analyzed with the help of STS and simulated with the python programming. The simulation result shows that the resiliency of the system is directly proportional to the number of compromised VB, and the use of proposed keydistribution technique improved the resiliency factor even if the increase in the number of compromised VB.
Description: Copyright of this document belongs to proceedings publisher.
URI: http://hdl.handle.net/2080/3282
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2019_VITECON_BMahapatra_SecureKey.pdfConference paper531.75 kBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.