Abstract

Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively under way. In particular, as the types and functions of mobile phones and IoT devices using 5G services are diversified, mutual authentication technology among multiple users is required.Methods/Statistical analysis: In this paper, we propose a multi - user authentication scheme which can efficiently mutually authenticate different types of mobile phones and IoT devices that are provided with 5G service. The proposed method minimizes the authentication delay time because it identifies the authentication security parameter δ of multiple users requesting authentication to the server as a polynomial coefficient. As a result of the performance evaluation, the proposed method showed an average improvement of 9.3% in authentication processing time and 5.5% lower overhead than the existing method. In addition, the multiuser authentication latency was improved by 6.1% on average compared with the existing scheme.Findings: The proposed scheme minimizes the user 's authentication delay time by constructing the users who simultaneously request the 5G service into a subnet and then applying the authentication security parameter δ constituting each subnet to n - bit and applying it to the polynomial coefficients. Especially, for multi - user authentication, the proposed scheme divides the authentication path into two paths (main path and secondary path) to guarantee user authentication and integrity. The proposed scheme is suitable for mobile phones and IoT devices that use low power because it generates keys without performing additional cryptographic algorithms like conventional techniques when performing multi - user authentication.Improvements/Applications: In future research, we plan to apply the proposed method to the actual environment based on the results of this study.

Highlights

  • As the fourth industrial revolution has become more socially prominent, communication services are gradually changing from 4G to 5G in the mobile communication field1. 5G technology is expected to be used in all devices such as smart phones, automobiles and IT products from 2020, and delay, speed and streaming service will be more supported than 3G and LTE technologies [2], [3]

  • We propose an authentication scheme that can perform user authentication when different types of mobile phones and Internet of Things (IoT) devices that are provided with 5G service connect to the server at the same time

  • The proposed scheme does not use an additional algorithm for user authentication processing, and the change in overhead is not higher than that of the existing scheme because the global key or signature key ρσ is generated to hierarchically represent the authentication processing configuration according to user attributes

Read more

Summary

Introduction

As the fourth industrial revolution has become more socially prominent, communication services are gradually changing from 4G to 5G in the mobile communication field1. 5G technology is expected to be used in all devices such as smart phones, automobiles and IT products from 2020, and delay, speed and streaming service will be more supported than 3G and LTE technologies [2], [3]. Sahid Raza et al proposed a method to reduce the overhead of DTLS through header compression [8] This technique shows that the header compression used for the purpose of increasing the efficiency of IoT is causing a lot of security problems. We propose an authentication scheme that can perform user authentication when different types of mobile phones and IoT devices that are provided with 5G service connect to the server at the same time. Since the proposed scheme improves the efficiency of authentication processing of multiple users, it can minimize the burden on the server. The proposed scheme is suitable for mobile phones and IoT devices that use low power because it generates keys without performing additional cryptographic algorithms like conventional techniques when performing multi-user authentication.

Mobile communication service
Previous research
Multiple attribute based user authentication scheme
Overview
Generate subnet polynomial coefficients
Attribute-based multi-user authentication using polynomials
Initialization process
User authentication signature process
Reuse attack
Spoofing attack
Preventing information disclosure
Attack based on multi-level service access authentication
Privacy attack
Authentication processing time
Multi-user authentication latency
Overhead
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.