Toward IoT Node Authentication Mechanism in Next Generation Networks

被引:8
作者
Nguyen, Dinh Duc Nha [1 ]
Sood, Keshav [1 ]
Xiang, Yong [2 ]
Gao, Longxiang [3 ,4 ]
Chi, Lianhua [5 ]
Yu, Shui [6 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat, Sch IT, Geelong, Vic 3220, Australia
[2] Deakin Univ, Sch IT, Deakin Blockchain Innovat Lab, Geelong, Vic 3220, Australia
[3] Qilu Univ Technol, Shandong Acad Sci, Fac Comp Sci & Technol, Jinan 250316, Peoples R China
[4] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Jinan 250101, Peoples R China
[5] La Trobe Univ, Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[6] Univ Technol Sydney, Dept Sch Software, Sydney, NSW 2007, Australia
关键词
5G security; authentication; Internet of Things (IoT); next generation networks; radio frequency (RF) fingerprinting; PHYSICAL-LAYER AUTHENTICATION; RF-DNA; SECURITY; INTERNET;
D O I
10.1109/JIOT.2023.3262822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the next generation networks (5G-NGNs) provide a flexible infrastructure to support latency-sensitive and bandwidth-hungry mission-critical Internet of Things (IoT) applications, however, the 5G-IoT integration in NGNs has increased the threat surface. Unfortunately, IoT devices are resource constrained, and the traditional intrusion detection systems (IDS) approaches based on cryptography are not effective on 5G-IoT ecosystems. In this article, we propose an effective 5G-IoT node authentication approach that leverages unique radio frequency (RF) fingerprinting data to train the Deep learning model to detect legitimate and nonlegitimate IoT nodes. Our approach is based on Mahalanobis Distance theory and Chi-square distribution theories. The proposed approach achieves a higher detection accuracy (99.35%) as well as lower training time compared to other existing approaches which is a key benefit of our approach in NGNs. The experiments are conducted using ETSI-open source NFV management and orchestration (OSM-MANO) platform on Amazon Web Services (AWSs) cloud platform to verify how the proposed approach would fit in real-life scenarios. The method can be used as a standalone security system or as a part of multifactor authentication.
引用
收藏
页码:13333 / 13341
页数:9
相关论文
共 50 条
  • [21] Phase-Assisted Dynamic Tag-Embedding Message Authentication for IoT Networks
    Qaisi, Malak
    Althunibat, Saud
    Qaraqe, Marwa
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 20620 - 20629
  • [22] Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
    Maurya, Anup Kumar
    Das, Ashok Kumar
    Jamal, Sajjad Shaukat
    Giri, Debasis
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 120
  • [23] Integrated authentication model for network access in Next Generation Networks
    Hong, Kihun
    Jung, Souhwan
    Kang, Namhi
    Kim, Younghan
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (11) : 3246 - 3249
  • [24] Spectral Efficiency Optimization for Next Generation NOMA-Enabled IoT Networks
    Khan, Wali Ullah
    Liu, Ju
    Jameel, Furqan
    Sharma, Vishal
    Jantti, Riku
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 15284 - 15297
  • [25] On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies
    Lau, Chi Ho
    Yan, Fan
    Chan, Sammy
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 389 - 400
  • [26] A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
    Yuan, Shengli
    Phan-Huynh, Randy
    [J]. 2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022, : 72 - 74
  • [27] Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks
    Illi, Elmehdi
    Qaraqe, Marwa
    Althunibat, Saud
    Alhasanat, Abdullah
    Alsafasfeh, Moath
    de Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Aman, Waqas
    Al-Kuwari, Saif
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (01): : 347 - 388
  • [28] An authentication mechanism based on blockchain for IoT environment
    Zargar, Gholam Reza
    Barati, Hamid
    Barati, Ali
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13239 - 13255
  • [29] A Novel IoT Architecture based on 5G-IoT and Next Generation Technologies
    Rahimi, Hamed
    Zibaeenejad, Ali
    Safavi, Ali Akbar
    [J]. 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 81 - 88
  • [30] A Secure Authentication Mechanism for Wireless Sensor Networks
    Ali, Rifaqat
    Chandrakar, Preeti
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    Pal, Arup Kumar
    Islam, S. K. Hafizul
    [J]. PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 206 - 213