scholarly journals Secure Authentication and Credential Establishment in Narrowband IoT and 5G

Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 882 ◽  
Author(s):  
Jesus Sanchez-Gomez ◽  
Dan Garcia-Carrillo ◽  
Rafael Marin-Perez ◽  
Antonio Skarmeta

Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Author(s):  
Rajarshi Sanyal ◽  
Ramjee Prasad

The key attributes envisioned for LTE-Advanced pertaining to 5G Networks are ubiquitous presence, device convergence, massive machine connectivity, ultrahigh throughput and moderated carbon footprint of the network and the user equipment actuated by offloading cellular data traffic and by enabling device to device communication. The present method of mobility management and addressing as the authors have foreseen in LTE Advanced can solve some issues of cellular traffic backhaul towards the access and core network by actuating a local breakout and enabling communication directly between devices. But most of the approaches look forward towards an enhancement in the radio resource allocation process and prone to interference. Besides, most of these proposals delve in Device to Device (D2D) mode initiation from the device end, but no research has so far addressed the concept of a network initiated D2D process, which can optimise the channel utilisation and network operations further. In their attempt to knot these loose ends together, the auhtors furnish the concept of WISDOM (Wireless Innovative System for Dynamic Operating Mega communications) (Badoi Cornelia-I., Prasad N., Croitoru V., Prasad R., 2011) (Prasad R., June 2013) (Prasad R.,December 2013) and SMNAT (Sanyal, R., Cianca, E. and Prasad,R.,2012a) () () () (. Further, the authors explore how SMNAT (Smart Mobile Network Access Topology) can engage with WISDOM in cooperative communication to actuate D2D communication initiated by the device or the network. WISDOM is an architectural concept for 5G Networks based on cognitive radio approach. The cognition, sustained by adaptation techniques, is a way to provide communication, convergence, connectivity, co-operation, and content, anytime and anywhere. Though D2D communication using a dedicated spectrum in multi cell environment is possible through advanced network coding or by use of fractional frequency reuse, but physical proximity of the 2 devices is still a key requisite. In this paper the authors will discuss SMNAT which employs physical layer addressing to enable D2D communication agnostic to the spatial coordinates of the devices.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 170615-170628 ◽  
Author(s):  
Sarmadullah Khan ◽  
Ahmed Ibrahim Alzahrani ◽  
Osama Alfarraj ◽  
Nasser Alalwan ◽  
Ali H. Al-Bayatti

Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 5012
Author(s):  
Janusz Furtak

Designers and users of the Internet of Things (IoT) are devoting more and more attention to the issues of security and privacy as well as the integration of data coming from various areas. A critical element of cooperation is building mutual trust and secure data exchange. Because IoT devices usually have small memory resources, limited computing power, and limited energy resources, it is often impossible to effectively use a well-known solution based on the Certification Authority. This article describes the concept of the system for a cryptographic Key Generating and Renewing system (KGR). The concept of the solution is based on the use of the hardware Trusted Platform Module (TPM) v2.0 to support the procedures of creating trust structures, generating keys, protecting stored data, and securing data exchange between system nodes. The main tasks of the system are the secure distribution of a new symmetric key and renewal of an expired key for data exchange parties. The KGR system is especially designed for clusters of the IoT nodes but can also be used by other systems. A service based on the Message Queuing Telemetry Transport (MQTT) protocol will be used to exchange data between nodes of the KGR system.


Author(s):  
Manuel Mogollon

Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication is essential for two parties to be able to trust in each other’s identities. Authentication is based on something you know (a password), on something you have (a token card, a digital certificate), or something that is part of you (fingerprints, voiceprint). A strong authentication requires at least two of these factors. The following mechanisms of authentication are described in this chapter: (1) IEEE 802.1X Access Control Protocol; (2) Extensible Authentication Protocol (EAP) and EAP methods; (3) traditional passwords; (4) Remote Authentication Dial-in Service (RADIUS); (5) Kerberos authentication service; and (6) X.509 authentication.


Sign in / Sign up

Export Citation Format

Share Document