Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/3282
Title: | A Secure Key Management and Authentication Protocol for Virtualized-BBU in C-RAN Architecture |
Authors: | Yadav, Awaneesh Kumar Mahapatra, Byomakesh Turuk, Ashok Kumar |
Keywords: | C-RAN Combinatorial design Network Security Resiliency VB V-BBU |
Issue Date: | Mar-2019 |
Citation: | International Conference on Vision Towards Emerging Trends in Communication and Networking (VITECON 2019) Vellore, India, 30-31 March 2019 |
Abstract: | The centralization and virtualization of baseband unit (BBU) in cloud radio access network (C-RAN) make the BS platform more scalable and flexible. The C-RAN is a next-generation collaborative RAN architecture develop using cloud computing and virtualization technology. C-RAN provide different radio services over a single platform. In comparison to the traditional BS, the architect of C-RAN has two distinct parts, i.e., a centralized Control Unit (CU) and a distributed unit (DU) known as Remote Radio Head (RRH). The RRH handles the end-user whereas the BBU unit performs the signal processing and controlling activity. The virtualized BBU consist of a set of virtual box (VB) managed by a virtual baseband manger (VBM) or hypervisor. As all the VB growth over a single virtualized BS platform, there is a chance of violation security principle such as data integrity, confidentiality and availability at the BBU. In this paper, we have proposed an authentication protocol to secure and independent operation of VB in a BBUpool. The proposed protocol use Steiner Triple System (STS) and combinatorialdesignmethodsforcrucialpre-shareddistribution. The proposed protocol simulated with Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The resiliency of V-BBU is analyzed with the help of STS and simulated with the python programming. The simulation result shows that the resiliency of the system is directly proportional to the number of compromised VB, and the use of proposed keydistribution technique improved the resiliency factor even if the increase in the number of compromised VB. |
Description: | Copyright of this document belongs to proceedings publisher. |
URI: | http://hdl.handle.net/2080/3282 |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2019_VITECON_BMahapatra_SecureKey.pdf | Conference paper | 531.75 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.