Toward IoT Node Authentication Mechanism in Next Generation Networks

被引:8
|
作者
Nguyen, Dinh Duc Nha [1 ]
Sood, Keshav [1 ]
Xiang, Yong [2 ]
Gao, Longxiang [3 ,4 ]
Chi, Lianhua [5 ]
Yu, Shui [6 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat, Sch IT, Geelong, Vic 3220, Australia
[2] Deakin Univ, Sch IT, Deakin Blockchain Innovat Lab, Geelong, Vic 3220, Australia
[3] Qilu Univ Technol, Shandong Acad Sci, Fac Comp Sci & Technol, Jinan 250316, Peoples R China
[4] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Jinan 250101, Peoples R China
[5] La Trobe Univ, Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[6] Univ Technol Sydney, Dept Sch Software, Sydney, NSW 2007, Australia
关键词
5G security; authentication; Internet of Things (IoT); next generation networks; radio frequency (RF) fingerprinting; PHYSICAL-LAYER AUTHENTICATION; RF-DNA; SECURITY; INTERNET;
D O I
10.1109/JIOT.2023.3262822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the next generation networks (5G-NGNs) provide a flexible infrastructure to support latency-sensitive and bandwidth-hungry mission-critical Internet of Things (IoT) applications, however, the 5G-IoT integration in NGNs has increased the threat surface. Unfortunately, IoT devices are resource constrained, and the traditional intrusion detection systems (IDS) approaches based on cryptography are not effective on 5G-IoT ecosystems. In this article, we propose an effective 5G-IoT node authentication approach that leverages unique radio frequency (RF) fingerprinting data to train the Deep learning model to detect legitimate and nonlegitimate IoT nodes. Our approach is based on Mahalanobis Distance theory and Chi-square distribution theories. The proposed approach achieves a higher detection accuracy (99.35%) as well as lower training time compared to other existing approaches which is a key benefit of our approach in NGNs. The experiments are conducted using ETSI-open source NFV management and orchestration (OSM-MANO) platform on Amazon Web Services (AWSs) cloud platform to verify how the proposed approach would fit in real-life scenarios. The method can be used as a standalone security system or as a part of multifactor authentication.
引用
收藏
页码:13333 / 13341
页数:9
相关论文
共 50 条
  • [1] An Authentication Protocol for Next Generation of Constrained IoT Systems
    Rostampour, Samad
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Kumari, Saru
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21493 - 21504
  • [2] On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure
    Das, Ashok Kumar
    Bera, Basudeb
    Wazid, Mohammad
    Jamal, Sajjad Shaukat
    Park, Youngho
    IEEE ACCESS, 2021, 9 : 71856 - 71867
  • [3] Hierarchical blockchain structure for node authentication in IoT networks
    Al Ahmed, Mahmoud Tayseer
    Hashim, Fazirulhisyam
    Hashim, Shaiful Jahari
    Abdullah, Azizol
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (02) : 345 - 361
  • [4] DMAM: distributed mobility and authentication mechanism in next generation networks
    Zubair, Muhammad
    Kong, Xiangwei
    Mahfooz, Saeed
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 845 - 863
  • [5] Design and Robust Evaluation of Next Generation Node Authentication Approach
    Nguyen, Dinh Duc Nha
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    Singh, Gurpreet
    Yu, Shui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5311 - 5323
  • [6] Towards Spoofing Resistant Next Generation IoT Networks
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Grobler, Marthie
    Doss, Robin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1669 - 1683
  • [7] A Survey on Next Generation IoT Networks from Green IoT Perspective
    Malik, Annu
    Kushwah, Rashmi
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2022, 29 (01) : 36 - 57
  • [8] GDPR Interference With Next Generation 5G and IoT Networks
    Rizou, Stavroula
    Alexandropoulou-Egyptiadou, Eugenia
    Psannis, Konstantinos E.
    IEEE ACCESS, 2020, 8 : 108052 - 108061
  • [9] Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
    Ashraf, Zeeshan
    Sohail, Adnan
    Hameed, Abdul
    Farhan, Muhammad
    Alotaibi, Faiz Abdullah
    Alnfiai, Mrim M.
    IEEE ACCESS, 2023, 11 : 137899 - 137910
  • [10] An OAuth based Authentication Mechanism for IoT Networks
    Emerson, Shamini
    Choi, Young-Kyu
    Hwang, Dong-Yeop
    Kim, Kang-Seok
    Kim, Ki-Hyung
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1072 - 1074