TY - GEN
T1 - Secure authentication protocol for 5G enabled IoT network
AU - Sharma, Suraj
AU - Satapathy, Shaswat
AU - Singh, Shivani
AU - Sahu, Amiya Kumar
AU - Obaidat, Mohammad S.
AU - Saxena, Sanjay
AU - Puthal, Deepak
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/12
Y1 - 2018/12
N2 - The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.
AB - The rapid growth of Internet of Things(IoT) along with wide range of applications made IoT popular. Moreover, the network connectivity and communication support is provided by 5G technology. The mobile technology is also becoming the essential component of Social life, which is also becoming the essential interface for IoT. Various services of IoT may be availed from IoT server, which are enabled with 5G network technology. The IoT service access would require a intermediate access network to connect to 5G, and access network may be publicly accessible. Hence, there exists security threat to user's data. Here, In this paper, We provided an application layer security protocol to mitigate all those attacks originating from public access network. We have also tested the security protocol by an automated security testing tool, Scyther. The security protocol exhibits Secrecy, Aliveness, Non-Injective Agreement, and Non-Inective Synchronization. The protocol is resistant to various attacks, which could originate from Confidentiality, Integrity and Availability. The user-credentials and services-request are secretly communicated, thereby preserving the privacy.
KW - 5G Service Slice
KW - Authentication
KW - IoT
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85069528156&partnerID=8YFLogxK
U2 - 10.1109/PDGC.2018.8745799
DO - 10.1109/PDGC.2018.8745799
M3 - Conference contribution
AN - SCOPUS:85069528156
T3 - PDGC 2018 - 2018 5th International Conference on Parallel, Distributed and Grid Computing
SP - 621
EP - 626
BT - PDGC 2018 - 2018 5th International Conference on Parallel, Distributed and Grid Computing
A2 - Singh, Pradeep Kumar
A2 - Kumar, Yugal
A2 - Ghrera, Satya Prakash
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th International Conference on Parallel, Distributed and Grid Computing, PDGC 2018
Y2 - 20 December 2018 through 22 December 2018
ER -