Toward IoT Node Authentication Mechanism in Next Generation Networks

被引:14
作者
Nguyen, Dinh Duc Nha [1 ]
Sood, Keshav [1 ]
Xiang, Yong [2 ]
Gao, Longxiang [3 ,4 ]
Chi, Lianhua [5 ]
Yu, Shui [6 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat, Sch IT, Geelong, Vic 3220, Australia
[2] Deakin Univ, Sch IT, Deakin Blockchain Innovat Lab, Geelong, Vic 3220, Australia
[3] Qilu Univ Technol, Shandong Acad Sci, Fac Comp Sci & Technol, Jinan 250316, Peoples R China
[4] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Jinan 250101, Peoples R China
[5] La Trobe Univ, Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[6] Univ Technol Sydney, Dept Sch Software, Sydney, NSW 2007, Australia
关键词
5G security; authentication; Internet of Things (IoT); next generation networks; radio frequency (RF) fingerprinting; PHYSICAL-LAYER AUTHENTICATION; RF-DNA; SECURITY; INTERNET;
D O I
10.1109/JIOT.2023.3262822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the next generation networks (5G-NGNs) provide a flexible infrastructure to support latency-sensitive and bandwidth-hungry mission-critical Internet of Things (IoT) applications, however, the 5G-IoT integration in NGNs has increased the threat surface. Unfortunately, IoT devices are resource constrained, and the traditional intrusion detection systems (IDS) approaches based on cryptography are not effective on 5G-IoT ecosystems. In this article, we propose an effective 5G-IoT node authentication approach that leverages unique radio frequency (RF) fingerprinting data to train the Deep learning model to detect legitimate and nonlegitimate IoT nodes. Our approach is based on Mahalanobis Distance theory and Chi-square distribution theories. The proposed approach achieves a higher detection accuracy (99.35%) as well as lower training time compared to other existing approaches which is a key benefit of our approach in NGNs. The experiments are conducted using ETSI-open source NFV management and orchestration (OSM-MANO) platform on Amazon Web Services (AWSs) cloud platform to verify how the proposed approach would fit in real-life scenarios. The method can be used as a standalone security system or as a part of multifactor authentication.
引用
收藏
页码:13333 / 13341
页数:9
相关论文
共 50 条
[41]   Secure Authentication and Access Mechanism for IoT Wireless Sensors [J].
Azarmehr, Mahzad ;
Ahmadi, Arash ;
Rashidzadeh, Rashid .
2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, :774-777
[42]   A Blockchain-based Authentication and Security Mechanism for IoT [J].
Li, Dongxing ;
Peng, Wei ;
Deng, Wenping ;
Gai, Fangyu .
2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
[43]   NEXT-GENERATION IOT NETWORKS: INTEGRATED SENSING COMMUNICATION AND COMPUTATION [J].
Rajput, Kunwar Pritiraj ;
Wu, Linlong ;
Shankar, M. R. Bhavani .
2023 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING WORKSHOPS, ICASSPW, 2023,
[44]   Trusted Authentication Mechanism of IoT Terminal Based on Authorization Consensus and Reputation Evaluation [J].
Rui, Lanlan ;
Zhao, Liangchen ;
Yan, Jingyang ;
Qiu, Xuesong ;
Guo, Shaoyong .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13) :23961-23976
[45]   Physical-Layer Authentication based on Spreading Code Watermarking for IoT Networks [J].
Leng, Yuqi ;
Zhang, Ruiqi ;
Wen, Wenkun ;
Wu, Peiran ;
Xia, Minghua .
2022 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA, ICCC WORKSHOPS, 2022, :434-438
[46]   LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Shetty, Sachin ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
SENSORS, 2019, 19 (24)
[47]   Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey [J].
Shruti ;
Rani, Shalli ;
Sah, Dipak Kumar ;
Gianini, Gabriele .
SENSORS, 2023, 23 (13)
[48]   Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks [J].
Naidu, Devishree ;
Ray, Niranjan K. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (27)
[49]   A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System [J].
Sahoo, Shreeya Swagatika ;
Mohanty, Sujata ;
Sahoo, Kshira Sagar ;
Daneshmand, Mahmoud ;
Gandomi, Amir H. .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) :15087-15099
[50]   A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks [J].
Thakur, Garima ;
Prajapat, Sunil ;
Kumar, Pankaj ;
Chen, Chien-Ming .
JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 154