A Smart Collaborative Authentication Framework for Multi-Dimensional Fine-Grained Control

The emergence of the 5G network has brought broad prospects for the massive terminal access and ubiquitous Internet of Things (IoTs). Potential attacking opportunities triggered by this progress are severely impacting the security fortress of current networks, especially in the edge access part. However, due to the unitary protection and inferior isolation, available security schemes are incapable of effectively eliminating these hidden perils. Motivated by these facts, we propose a Multi-dimensional Fine-grained Control (MFC) framework to strengthen safety and reliability in Radio Access Networks (RANs). First, we comprehensively survey and summarize the existing security schemes to grasp respective effects and limitations. Second, the MFC framework is established to describe the model structure and implementation processes. An identifier mapping mechanism is designed to achieve network isolation. We perform the security analysis of MFC by theoretically comparing diversified policies. Third, an integrated set of the authentication prototype system is created with wireless environment parameters settings. Specific verification scenarios are illustrated. Finally, we test the performances of the MFC framework. Validation results demonstrate that the proposed scheme can accomplish reliable security control at the access side. Comparing to multiple schemes, the performances, in terms of time and concurrency, are optimized. Therefore, the MFC framework is feasible for applications in 5G or IoT.

[1]  Anirban Sengupta,et al.  Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE , 2019, IEEE Transactions on Consumer Electronics.

[2]  Waleed Bul’ajoul,et al.  A New Architecture for Network Intrusion Detection and Prevention , 2019, IEEE Access.

[3]  Jianwei Liu,et al.  Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing , 2019, IEEE Access.

[4]  Kim-Kwang Raymond Choo,et al.  Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks , 2020, IEEE Transactions on Industrial Informatics.

[5]  Duncan S. Wong,et al.  Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol , 2016, Int. J. Commun. Syst..

[6]  Feng Wu,et al.  A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.

[7]  Ying Chen,et al.  An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.

[8]  Jia Jingping,et al.  Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems , 2019, IEEE Access.

[9]  Chien-Ming Chen,et al.  Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.

[10]  Zhihui Du,et al.  HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design , 2019, IEEE Journal on Selected Areas in Communications.

[11]  Anil K. Jain,et al.  Automated Latent Fingerprint Recognition , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Honglong Chen,et al.  Dynamic Distributed Honeypot Based on Blockchain , 2019, IEEE Access.

[13]  Xiong Luo,et al.  A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.

[14]  Hong Wen,et al.  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.

[15]  Chen Li,et al.  A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.

[16]  Hongjie Chen,et al.  An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection , 2019, IEEE Access.

[17]  YoHan Park,et al.  Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks , 2016, Int. J. Distributed Sens. Networks.

[18]  Joel J. P. C. Rodrigues,et al.  Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.

[19]  Hongke Zhang,et al.  Modeling Space-Terrestrial Integrated Networks with Smart Collaborative Theory , 2019, IEEE Network.

[20]  Baocang Wang,et al.  Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability , 2019, IEEE Access.

[21]  Vijayalakshmi Atluri,et al.  Security analysis of ABAC under an administrative model , 2019, IET Inf. Secur..

[22]  Naoto Yanai,et al.  RBAC-SC: Role-Based Access Control Using Smart Contract , 2018, IEEE Access.

[23]  Ping Wang,et al.  Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.

[24]  Hongke Zhang,et al.  Smart collaborative distribution for privacy enhancement in moving target defense , 2019, Inf. Sci..

[25]  Wen-Tsuen Chen,et al.  Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading , 2018, IEEE Internet of Things Journal.

[26]  Geovane Fedrecheski,et al.  Attribute-Based Access Control for the Swarm With Distributed Policy Management , 2019, IEEE Transactions on Consumer Electronics.

[27]  Peilin Hong,et al.  An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.

[28]  Félix J. García Clemente,et al.  A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.

[29]  Fuhong Lin,et al.  A novel secure data transmission scheme in industrial internet of things , 2020, China Communications.

[30]  Jianhua Chen,et al.  Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[31]  Hongke Zhang,et al.  A Smart Collaborative Charging Algorithm for Mobile Power Distribution in 5G Networks , 2018, IEEE Access.

[32]  Albert Y. Zomaya,et al.  NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.

[33]  Fei Song,et al.  A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios , 2018, Sensors.

[34]  Tao Qin,et al.  An Effective High Threating Alarm Mining Method for Cloud Security Management , 2018, IEEE Access.

[35]  Muhammad Munwar Iqbal,et al.  Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis , 2019, IEEE Access.

[36]  Ruomei Wang,et al.  An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification , 2018, IEEE Access.

[37]  Keqin Li,et al.  CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme , 2019, IEEE Access.

[38]  Ravi S. Sandhu,et al.  Mandatory Content Access Control for Privacy Protection in Information Centric Networks , 2017, IEEE Transactions on Dependable and Secure Computing.

[39]  Dariush Abbasinezhad-Mood,et al.  A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud , 2019, IEEE Transactions on Parallel and Distributed Systems.

[40]  Jiguo Yu,et al.  MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks , 2019, IEEE Access.

[41]  Mohammad S. Obaidat,et al.  Security analysis and design of an efficient ECC-based two-factor password authentication scheme , 2016, Secur. Commun. Networks.

[42]  Jing Chen,et al.  A Lattice-Based Incremental Signature Scheme , 2019, IEEE Access.

[43]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.