Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3282
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYadav, Awaneesh Kumar-
dc.contributor.authorMahapatra, Byomakesh-
dc.contributor.authorTuruk, Ashok Kumar-
dc.date.accessioned2019-04-11T10:37:38Z-
dc.date.available2019-04-11T10:37:38Z-
dc.date.issued2019-03-
dc.identifier.citationInternational Conference on Vision Towards Emerging Trends in Communication and Networking (VITECON 2019) Vellore, India, 30-31 March 2019en_US
dc.identifier.urihttp://hdl.handle.net/2080/3282-
dc.descriptionCopyright of this document belongs to proceedings publisher.en_US
dc.description.abstractThe centralization and virtualization of baseband unit (BBU) in cloud radio access network (C-RAN) make the BS platform more scalable and flexible. The C-RAN is a next-generation collaborative RAN architecture develop using cloud computing and virtualization technology. C-RAN provide different radio services over a single platform. In comparison to the traditional BS, the architect of C-RAN has two distinct parts, i.e., a centralized Control Unit (CU) and a distributed unit (DU) known as Remote Radio Head (RRH). The RRH handles the end-user whereas the BBU unit performs the signal processing and controlling activity. The virtualized BBU consist of a set of virtual box (VB) managed by a virtual baseband manger (VBM) or hypervisor. As all the VB growth over a single virtualized BS platform, there is a chance of violation security principle such as data integrity, confidentiality and availability at the BBU. In this paper, we have proposed an authentication protocol to secure and independent operation of VB in a BBUpool. The proposed protocol use Steiner Triple System (STS) and combinatorialdesignmethodsforcrucialpre-shareddistribution. The proposed protocol simulated with Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The resiliency of V-BBU is analyzed with the help of STS and simulated with the python programming. The simulation result shows that the resiliency of the system is directly proportional to the number of compromised VB, and the use of proposed keydistribution technique improved the resiliency factor even if the increase in the number of compromised VB.en_US
dc.subjectC-RANen_US
dc.subjectCombinatorial designen_US
dc.subjectNetwork Securityen_US
dc.subjectResiliencyen_US
dc.subjectVBen_US
dc.subjectV-BBUen_US
dc.titleA Secure Key Management and Authentication Protocol for Virtualized-BBU in C-RAN Architectureen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2019_VITECON_BMahapatra_SecureKey.pdfConference paper531.75 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.