Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT

被引:208
作者
Ni, Jianbing [1 ]
Lin, Xiaodong [2 ]
Shen, Xuemin Sherman [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Wilfrid Laurier Univ, Dept Phys & Comp Sci, Waterloo, ON N2L 3C5, Canada
基金
中国国家自然科学基金;
关键词
5G network; Internet of Things (IoT); anonymous authentication; fog computing; network slicing; THINGS APPLICATIONS; WIRELESS NETWORKS; 5G; INTERNET; ARCHITECTURE; MACHINE;
D O I
10.1109/JSAC.2018.2815418
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
5G network is considered as a key enabler in meeting continuously increasing demands for the future Internet of Things (IoT) services, including high data rate, numerous devices connection, and low service latency. To satisfy these demands, network slicing and fog computing have been envisioned as the promising solutions in service-oriented 5G architecture. However, security paradigms enabling authentication and confidentiality of 5G communications for IoT services remain elusive, but indispensable. In this paper, we propose an efficient and secure service-oriented authentication framework supporting network slicing and fog computing for 5G-enabled IoT services. Specifically, users can efficiently establish connections with 5G core network and anonymously access IoT services under their delegation through proper network slices of 5G infrastructure selected by fog nodes based on the slice/service types of accessing services. The privacy-preserving slice selection mechanism is introduced to preserve both configured slice types and accessing service types of users. In addition, session keys are negotiated among users, local fogs and IoT servers to guarantee secure access of service data in fog cache and remote servers with low latency. We evaluate the performance of the proposed framework through simulations to demonstrate its efficiency and feasibility under 5G infrastructure.
引用
收藏
页码:644 / 657
页数:14
相关论文
共 46 条
[1]  
3GPP, 2017, 33501 3GPP TS
[2]  
3GPP, 2017, 33899 3GPP TS
[3]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[4]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[5]  
[Anonymous], 2017, 23501 3GPP TS
[6]   Constant-Size Dynamic k-Times Anonymous Authentication [J].
Au, Man Ho ;
Susilo, Willy ;
Mu, Yi ;
Chow, Sherman S. M. .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :249-261
[7]   Efficient Tracking Area Management Framework for 5G Networks [J].
Bagaa, Miloud ;
Taleb, Tarik ;
Ksentini, Adlen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :4117-4131
[8]   Programmable architecture based on Software Defined Network for Internet of Things: Connected Dominated Sets approach [J].
Bendouda, Djamila ;
Rachedi, Abderrezak ;
Haffaf, Hafid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :188-197
[9]  
Bing C., 2016, 4G LTE PROTOCOLS USE
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56