Abstract

An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems. Due to dramatic increases in the number of cellular IoT devices, a centralized authentication architecture in which a mobility management entity in core networks administers authentication of massive numbers of IoT devices may cause network congestion with large signaling overhead. Thus, a distributed authentication architecture in which a base station in radio access networks authenticates IoT devices locally is presented. In addition, a cross-layer authentication protocol is designed with a novel integration strategy under the distributed authentication architecture, where PLA, which employs physical features for authentication, is used as preemptive authentication in the proposed protocol. Theoretical analysis and numerical simulations were performed to analyze the trade-off between authentication performance and overhead in the proposed authentication method compared with existing authentication protocols. The results demonstrate that the proposed protocol outperforms conventional authentication and key agreement protocols in terms of overhead and computational complexity while guaranteeing low authentication error probability.

Highlights

  • With massive communication capacity and connectivity, the fifth-generation (5G) mobile network technology is considered the key enabler of the fourth industrial revolution [1]

  • Instead of requiring a user password in human-type communications (HTC), it is possible to confirm the identity of a device for machine-type communications (MTC) by using cryptography-based authentication algorithms

  • It is assumed that a = 1/BWa, b = 1/BWb, and c = 1/BWc, where BWa, BWb, and BWc denote the bandwidths between Internet of things (IoT) device and base station (BS) and between BS and management entity (MME) and between MME and home subscriber server (HSS), respectively

Read more

Summary

Introduction

With massive communication capacity and connectivity, the fifth-generation (5G) mobile network technology is considered the key enabler of the fourth industrial revolution [1]. Despite the remarkable advances, security remains a serious problem [2], [3]. It has various security vulnerabilities, for example, due to the potential massive scale of connectivity and, limited hardware resources of IoT devices. As cyber physical critical infrastructure systems, e.g., smart grids have been deployed using 5G technology, ensuring security has become increasingly important. An evolved packet system AKA (EPS-AKA) protocol has been widely used for mutual authentication between a cellular network and a mobile device in long-term

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.