Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking

被引:22
作者
Bordel, Borja [1 ]
Alcarria, Ramon [2 ]
Robles, Tomas [1 ]
Sanchez Iglesias, Marcos [3 ]
机构
[1] Univ Politecn Madrid, Dept Sistemas Informat, Madrid 28031, Spain
[2] Univ Politecn Madrid, Dept Ingn Topog & Cartog, Madrid 28031, Spain
[3] Escuela Super Informat, Ciudad Real 13071, Spain
关键词
5G mobile communication; Authentication; Watermarking; Encryption; Signal processing algorithms; Servers; Routing protocols; 5G networks; Internet-of-Things; digital watermarking; physical unclonable functions; data authentication; chaotic encryption; CYBER-PHYSICAL SYSTEMS; PRIVACY PROTECTION; INTERNET; SECURITY; SCHEME; POWER;
D O I
10.1109/ACCESS.2021.3055771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by emerging 5G networks. In this context, complex routing schemes for pervasive infrastructures are highly simplified, as every hardware element may stablish its own communication link with a 5G base station. However, this situation also introduces new risks, especially in the security field where innovative cyber-physical attacks and distributed denial of service attacks are becoming more popular and dangerous each day. Thus, data authentication, protection and anonymization in those new applications and schemes is a key challenge to be addressed. Besides, most devices in future IoT systems will be resource constrained, so traditional solutions based on private keys stored in devices' memory and computationally heavy cryptographic algorithms will turn unsecure, inefficient or, directly, impossible to run. Therefore, in this paper we propose a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. The proposed solution employs both digital watermarking techniques and lightweight cryptographic technologies. To generate keys in a secure and simple manner, physical unclonable functions are employed. Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered. In order to evaluate the performance of the proposed solution an experimental validation based on simulation techniques is also carried out.
引用
收藏
页码:22378 / 22398
页数:21
相关论文
共 50 条
  • [1] A novel digital watermarking scheme for data authentication and copyright protection in 5G networks
    Sk, Ayesha
    Masilamani, V.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 : 589 - 605
  • [2] A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Sahoo, Kshira Sagar
    Daneshmand, Mahmoud
    Gandomi, Amir H.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) : 15087 - 15099
  • [3] Secure Authentication and Credential Establishment in Narrowband IoT and 5G
    Sanchez-Gomez, Jesus
    Garcia-Carrillo, Dan
    Marin-Perez, Rafael
    Skarmeta, Antonio F.
    SENSORS, 2020, 20 (03)
  • [4] A cybersecurity review in IoT 5G networks
    Narciandi-Rodriguez, Diego
    Aveleira-Mata, Jose
    Garcia-Ordas, Maria Teresa
    Alfonso-Cendon, Javier
    Benavides, Carmen
    Alaiz-Moreton, Hector
    INTERNET OF THINGS, 2025, 30
  • [5] GDPR Interference With Next Generation 5G and IoT Networks
    Rizou, Stavroula
    Alexandropoulou-Egyptiadou, Eugenia
    Psannis, Konstantinos E.
    IEEE ACCESS, 2020, 8 : 108052 - 108061
  • [6] Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
    Cook, Jonathan
    Rehman, Sabih Ur
    Khan, M. Arif
    IEEE ACCESS, 2023, 11 : 39295 - 39317
  • [7] The Impact of Mobility on Physical Layer Security of 5G IoT Networks
    Yu, Kan
    Yu, Jiguo
    Luo, Chuanwen
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (03) : 1042 - 1055
  • [8] A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    IEEE ACCESS, 2022, 10 : 57485 - 57498
  • [9] Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
    Ahmed, Sabrina
    Subah, Zareen
    Ali, Mohammed Zamshed
    2022 IEEE SENSORS, 2022,
  • [10] A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC
    Ranaweera, Pasika
    Yadav, Awaneesh Kumar
    Liyanage, Madhusanka
    Jurcut, Anca Delia
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2930 - 2948