当前位置: X-MOL 学术J. Ambient Intell. Human. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
Journal of Ambient Intelligence and Humanized Computing Pub Date : 2021-01-16 , DOI: 10.1007/s12652-020-02857-4
Raghu Pothumarti , Kurunandan Jain , Prabhakar Krishnan

The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous computing capabilities of individual devices and self-organizing, greatly influence their applications in smart connected world. To achieve the sufficient security and privacy, autonomous and dynamic adaptive key management scheme and mutual authentication protocols should be provided to validate legitimacies of large number of nodes, users, devices, and servers in 5G networks. To this end, we propose a lightweight cipher approach that enhances the security level of communications and enables authentication and access control scheme that is implemented on a multi-layer communication architecture designed for NB-IoT 5G networks and resolve heterogeneity and scalability issues. It is well known that establishing an efficient cryptographic key generation and management scheme for machine-to-machine (M2M) and device-to-device (D2D) communication for IoT networks in 5G, the purposes of encryption and decryption is severely constrained by computation resources and performance. As a part of the network security, the key management plays a vital role in it. When compared to other schemes in PKI such as public key, pairwise-key and group-based key management, the dynamic-key based security is efficient in resource utilization and scalable which are the two key performance factors for Cloud based IoT/wireless sensory networks. Usually most IoT networks use a less secure communication channel that employs session keys in order to encrypt the communication. Additionally, in most IoT networks the resource consumption is constrained which then results in existing dynamic key generation algorithms being infeasible to run. It is still a challenging problem to securely interconnect and operate IoT protocols between constrained embedded devices. We propose a novel dynamic key generation scheme that takes the entropy and performs various operations to continuously generate a large set of unique keys. This type of key generation model is predominantly suitable for the conditions where the IoT devices cannot rely on constant key negotiation with dedicated servers as well as those devices which cannot reuse existing keys for encryption purposes. Performance evaluation using simulation and case study demonstrates that our dynamic key establishment scheme ensures an enhanced security level while reducing the communication overhead and the average latency for different category of IoT applications in 5G networks.



中文翻译:

5G移动通信的轻量级身份验证方案:动态密钥方法

现代物联网行业4.0、5G,6G,移动自组网(MANET),窄带物联网(NB-IoT)和无线传感(WSN)网络的安全性以及单个设备的自主计算能力和自我组织能力会极大地影响在智能互联世界中的应用。为了实现足够的安全性和私密性,应提供自主和动态的自适应密钥管理方案以及相互认证协议以验证5G网络中大量节点,用户,设备和服务器的合法性。为此,我们提出了一种轻量级的加密方法,该方法可增强通信的安全级别,并支持在为NB-IoT 5G网络设计的多层通信体系结构上实施的身份验证和访问控制方案,并解决异构性和可扩展性问题。众所周知,为5G IoT网络的机器对机器(M2M)和设备对设备(D2D)通信建立有效的加密密钥生成和管理方案,加密和解密的目的受到计算的严重限制。资源和性能。作为网络安全性的一部分,密钥管理在其中扮演着至关重要的角色。与PKI中的其他方案(例如,公钥,成对密钥和基于组的密钥管理)相比,基于动态密钥的安全性在资源利用率和可伸缩性方面都是高效的,这是基于云的IoT /无线传感网络的两个关键性能因素。通常,大多数物联网网络使用不太安全的通信通道,该通道使用会话密钥来加密通信。另外,在大多数物联网网络中,资源消耗受到限制,这将导致现有的动态密钥生成算法无法运行。在受限的嵌入式设备之间安全地互连和操作IoT协议仍然是一个具有挑战性的问题。我们提出了一种新颖的动态密钥生成方案,该方案采用熵并执行各种操作以连续生成大量唯一密钥。这种类型的密钥生成模型主要适用于IoT设备无法依赖与专用服务器进行恒定密钥协商以及无法将现有密钥用于加密目的的设备的情况。

更新日期:2021-01-18
down
wechat
bug