Enhancing 5G mobile security by using improved CRC authentication scheme

The fifth generation of wireless mobile communication (5G) will be rolled out by 2020. Higher transmission speed and lower latency in 5G must bring a lot of convenience into people's life. 5G aims to connect more wireless devices compared before, so we can image our life will be almost supporte...

Full description

Bibliographic Details
Main Author: Fan, Jingyu
Other Authors: Ma Maode
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/72540
Description
Summary:The fifth generation of wireless mobile communication (5G) will be rolled out by 2020. Higher transmission speed and lower latency in 5G must bring a lot of convenience into people's life. 5G aims to connect more wireless devices compared before, so we can image our life will be almost supported by wireless devices at the age of 5G. Meanwhile connected devices provide more targets and surfaces which can be attacked by some malicious hackers. Therefore, transmission security plays a significant role in 5G development. To satisfy requirements of 5G security, we do some modification on classic CRC authentication scheme which can detect more types of errors. In addition, we also quantitatively analyze the security of improved CRC scheme, and prove that the probability of undetected errors in new authentication scheme is lower compared by classic one. This improved CRC scheme still keeps a lot of advantages of classic CRC, at the same time it also has some differences. For example, the new one can detect nearly all double-bit errors but within a block size and this kind of errors is extremely important in 5G transmission. Beyond that, this paper also provide a program based on language C++ which can generally implement the function of improved CRC scheme, though it still exists some drawbacks need to be improved. According to results of program testing, we can conclude that the program can basically achieve some functions like errors detecting, CRC check codes indicating and special message processing, thus it is very suitable for 5G transmission. Keywords - 5G; Security; CRC; Authentication; Programming