Cargando…
Secure Authentication and Credential Establishment in Narrowband IoT and 5G
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Ne...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038755/ https://www.ncbi.nlm.nih.gov/pubmed/32045992 http://dx.doi.org/10.3390/s20030882 |
_version_ | 1783500707295395840 |
---|---|
author | Sanchez-Gomez, Jesus Garcia-Carrillo, Dan Marin-Perez, Rafael Skarmeta, Antonio F. |
author_facet | Sanchez-Gomez, Jesus Garcia-Carrillo, Dan Marin-Perez, Rafael Skarmeta, Antonio F. |
author_sort | Sanchez-Gomez, Jesus |
collection | PubMed |
description | Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments. |
format | Online Article Text |
id | pubmed-7038755 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-70387552020-03-09 Secure Authentication and Credential Establishment in Narrowband IoT and 5G Sanchez-Gomez, Jesus Garcia-Carrillo, Dan Marin-Perez, Rafael Skarmeta, Antonio F. Sensors (Basel) Article Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments. MDPI 2020-02-07 /pmc/articles/PMC7038755/ /pubmed/32045992 http://dx.doi.org/10.3390/s20030882 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sanchez-Gomez, Jesus Garcia-Carrillo, Dan Marin-Perez, Rafael Skarmeta, Antonio F. Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title | Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title_full | Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title_fullStr | Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title_full_unstemmed | Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title_short | Secure Authentication and Credential Establishment in Narrowband IoT and 5G |
title_sort | secure authentication and credential establishment in narrowband iot and 5g |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038755/ https://www.ncbi.nlm.nih.gov/pubmed/32045992 http://dx.doi.org/10.3390/s20030882 |
work_keys_str_mv | AT sanchezgomezjesus secureauthenticationandcredentialestablishmentinnarrowbandiotand5g AT garciacarrillodan secureauthenticationandcredentialestablishmentinnarrowbandiotand5g AT marinperezrafael secureauthenticationandcredentialestablishmentinnarrowbandiotand5g AT skarmetaantoniof secureauthenticationandcredentialestablishmentinnarrowbandiotand5g |