Cargando…

Secure Authentication and Credential Establishment in Narrowband IoT and 5G

Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Ne...

Descripción completa

Detalles Bibliográficos
Autores principales: Sanchez-Gomez, Jesus, Garcia-Carrillo, Dan, Marin-Perez, Rafael, Skarmeta, Antonio F.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038755/
https://www.ncbi.nlm.nih.gov/pubmed/32045992
http://dx.doi.org/10.3390/s20030882
_version_ 1783500707295395840
author Sanchez-Gomez, Jesus
Garcia-Carrillo, Dan
Marin-Perez, Rafael
Skarmeta, Antonio F.
author_facet Sanchez-Gomez, Jesus
Garcia-Carrillo, Dan
Marin-Perez, Rafael
Skarmeta, Antonio F.
author_sort Sanchez-Gomez, Jesus
collection PubMed
description Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.
format Online
Article
Text
id pubmed-7038755
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-70387552020-03-09 Secure Authentication and Credential Establishment in Narrowband IoT and 5G Sanchez-Gomez, Jesus Garcia-Carrillo, Dan Marin-Perez, Rafael Skarmeta, Antonio F. Sensors (Basel) Article Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments. MDPI 2020-02-07 /pmc/articles/PMC7038755/ /pubmed/32045992 http://dx.doi.org/10.3390/s20030882 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sanchez-Gomez, Jesus
Garcia-Carrillo, Dan
Marin-Perez, Rafael
Skarmeta, Antonio F.
Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title_full Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title_fullStr Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title_full_unstemmed Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title_short Secure Authentication and Credential Establishment in Narrowband IoT and 5G
title_sort secure authentication and credential establishment in narrowband iot and 5g
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038755/
https://www.ncbi.nlm.nih.gov/pubmed/32045992
http://dx.doi.org/10.3390/s20030882
work_keys_str_mv AT sanchezgomezjesus secureauthenticationandcredentialestablishmentinnarrowbandiotand5g
AT garciacarrillodan secureauthenticationandcredentialestablishmentinnarrowbandiotand5g
AT marinperezrafael secureauthenticationandcredentialestablishmentinnarrowbandiotand5g
AT skarmetaantoniof secureauthenticationandcredentialestablishmentinnarrowbandiotand5g