Secure Authentication Protocol for 5G Enabled IoT Network

The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.

[1]  Mohammad S. Obaidat,et al.  Trust-enhanced message security protocol for mobile ad hoc networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[2]  Ian F. Akyildiz,et al.  The evolution to 4G cellular systems: LTE-Advanced , 2010, Phys. Commun..

[3]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[4]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[5]  Tin Yu Wu,et al.  A Hash-Based Distributed Storage Strategy of FlowTables in SDN-IoT Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[6]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[7]  E. Monteiro,et al.  Evaluation of Mobile Communications : From Voice Calls to Ubiquitous Multimedia Group Communications , 2004 .

[8]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[9]  P. Venkata Krishna,et al.  CHSEO: An Energy Optimization Approach for Communication in the Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[10]  Jong Hyuk Park,et al.  User Experience and Quality-of-Service in Internet of Things: Practice and Trends , 2016, Wirel. Pers. Commun..

[11]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[12]  Navid Nikaein,et al.  Towards enforcing Network Slicing on RAN: Flexibility and Resources abstraction , 2017 .

[13]  Alessandro Neri,et al.  A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).

[14]  Xuemin Shen,et al.  Enabling device-to-device communications in millimeter-wave 5G cellular networks , 2015, IEEE Communications Magazine.

[15]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.

[16]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[17]  Petar Popovski,et al.  5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View , 2018, IEEE Access.

[18]  Hong Wen,et al.  5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[19]  Honggang Zhang,et al.  Network slicing as a service: enabling enterprises' own software-defined cellular networks , 2016, IEEE Communications Magazine.

[20]  Cas J. F. Cremers,et al.  Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.

[21]  Geng Wu,et al.  An end-to-end network slicing framework for 5G wireless communication systems , 2016, ArXiv.

[22]  Mohammad S. Obaidat,et al.  TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks , 2018, IEEE Transactions on Mobile Computing.

[23]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .