Suraj Sharma, S. Satapathy, Shivani Singh, A. K. Sahu, M. Obaidat, Sanjay Saxena, Deepak Puthal
{"title":"5G物联网安全认证协议","authors":"Suraj Sharma, S. Satapathy, Shivani Singh, A. K. Sahu, M. Obaidat, Sanjay Saxena, Deepak Puthal","doi":"10.1109/PDGC.2018.8745799","DOIUrl":null,"url":null,"abstract":"The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secure Authentication Protocol for 5G Enabled IoT Network\",\"authors\":\"Suraj Sharma, S. Satapathy, Shivani Singh, A. K. Sahu, M. Obaidat, Sanjay Saxena, Deepak Puthal\",\"doi\":\"10.1109/PDGC.2018.8745799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.\",\"PeriodicalId\":303401,\"journal\":{\"name\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"volume\":\"145 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2018.8745799\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2018.8745799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Authentication Protocol for 5G Enabled IoT Network
The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.