Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking

被引:22
作者
Bordel, Borja [1 ]
Alcarria, Ramon [2 ]
Robles, Tomas [1 ]
Sanchez Iglesias, Marcos [3 ]
机构
[1] Univ Politecn Madrid, Dept Sistemas Informat, Madrid 28031, Spain
[2] Univ Politecn Madrid, Dept Ingn Topog & Cartog, Madrid 28031, Spain
[3] Escuela Super Informat, Ciudad Real 13071, Spain
关键词
5G mobile communication; Authentication; Watermarking; Encryption; Signal processing algorithms; Servers; Routing protocols; 5G networks; Internet-of-Things; digital watermarking; physical unclonable functions; data authentication; chaotic encryption; CYBER-PHYSICAL SYSTEMS; PRIVACY PROTECTION; INTERNET; SECURITY; SCHEME; POWER;
D O I
10.1109/ACCESS.2021.3055771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by emerging 5G networks. In this context, complex routing schemes for pervasive infrastructures are highly simplified, as every hardware element may stablish its own communication link with a 5G base station. However, this situation also introduces new risks, especially in the security field where innovative cyber-physical attacks and distributed denial of service attacks are becoming more popular and dangerous each day. Thus, data authentication, protection and anonymization in those new applications and schemes is a key challenge to be addressed. Besides, most devices in future IoT systems will be resource constrained, so traditional solutions based on private keys stored in devices' memory and computationally heavy cryptographic algorithms will turn unsecure, inefficient or, directly, impossible to run. Therefore, in this paper we propose a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. The proposed solution employs both digital watermarking techniques and lightweight cryptographic technologies. To generate keys in a secure and simple manner, physical unclonable functions are employed. Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered. In order to evaluate the performance of the proposed solution an experimental validation based on simulation techniques is also carried out.
引用
收藏
页码:22378 / 22398
页数:21
相关论文
共 50 条
  • [21] Projections of IoT Applications in Colombia Using 5G Wireless Networks
    Barrios-Ulloa, Alexis
    Cama-Pinto, Dora
    Mardini-Bovea, Johan
    Diaz-Martinez, Jorge
    Cama-Pinto, Alejandro
    SENSORS, 2021, 21 (21)
  • [22] Enabling Roaming Across Heterogeneous IoT Wireless Networks: LoRaWAN MEETS 5G
    Torroglosa-Garcia, Elena M.
    Alcaraz Calero, Jose M.
    Bernal Bernabe, Jorge
    Skarmeta, Antonio
    IEEE ACCESS, 2020, 8 : 103164 - 103180
  • [23] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329
  • [24] Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
    Fang, He
    Wang, Xianbin
    Tomasin, Stefano
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 55 - 61
  • [25] Authentication for E-health applications in Iot enabled 5G and proposed solution
    Manal, Rayyam
    Fatima, Rougaii
    Tomader, Mazri
    4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
  • [26] Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Liang, Chen
    Li, Hui
    Yang, Yintang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3095 - 3104
  • [27] Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions
    Park, Ji Su
    Park, Jong Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (04): : 743 - 749
  • [28] An Efficient Authentication Protocol for 5G Heterogeneous Networks
    El Hajjaji El Idrissi, Younes
    Zahid, Noureddine
    Jedra, Mohamed
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 496 - 508
  • [29] Survey on authentication and security protocols and schemes over 5G networks
    Tashtoush, Yahya
    Darweesh, Dirar
    Karajeh, Ola
    Darwish, Omar
    Maabreh, Majdi
    Swedat, Safa'
    Koraysh, Rawan
    Almousa, Omar
    Alsaedi, Nasser
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (10):
  • [30] A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios
    Xu, Lina
    Collier, Rem
    O'Hare, Gregory M. P.
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1229 - 1249