A mutual exclusion key pairing scheme for preserving the privacy of channel shared 5G users
The fifth generation (5G) network ensures terahertz communication and low latency features to improve the Quality of Service (QoS). Based on the communication and service demands, the security and privacy requirements of the users directly impact the QoS. Therefore, unanimous and conventional key-di...
Saved in:
| Main Authors: | , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-06-01
|
| Series: | Alexandria Engineering Journal |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016825004090 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The fifth generation (5G) network ensures terahertz communication and low latency features to improve the Quality of Service (QoS). Based on the communication and service demands, the security and privacy requirements of the users directly impact the QoS. Therefore, unanimous and conventional key-different security methods are required for user privacy. This article introduces a Mutual Exclusion Key Pairing-based Privacy-Preserving Scheme (MEKP-PPS) to strengthen uninterrupted services with precise privacy. This scheme considers the mutual radio resource allocation and sharing intervals between the communicating terminal and user equipment to balance two distinct privacy administrations. In the sharing-dependent process, privacy is ensured using two-way authentication, whereas a one-way authentication is sufficient for mutual sharing. The exclusion of keys is considered from the allocation to sharing interval with pairing security features. This means the security amendments are valid for authentication and privacy preservation until the mutual active resource-sharing interval. This key generation and sharing are aided by mono-hashing RSA with an enabled feature. The process ensures a unanimous concealed communication for shared radio resources within the allocated channel, ensuring user privacy. For different users, privacy authentication is retained at 10.22 % with a lower complexity of 11.85 % and a shorter privacy authentication time of 8.35 % compared to the other methods. |
|---|---|
| ISSN: | 1110-0168 |