Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking

被引:22
作者
Bordel, Borja [1 ]
Alcarria, Ramon [2 ]
Robles, Tomas [1 ]
Sanchez Iglesias, Marcos [3 ]
机构
[1] Univ Politecn Madrid, Dept Sistemas Informat, Madrid 28031, Spain
[2] Univ Politecn Madrid, Dept Ingn Topog & Cartog, Madrid 28031, Spain
[3] Escuela Super Informat, Ciudad Real 13071, Spain
关键词
5G mobile communication; Authentication; Watermarking; Encryption; Signal processing algorithms; Servers; Routing protocols; 5G networks; Internet-of-Things; digital watermarking; physical unclonable functions; data authentication; chaotic encryption; CYBER-PHYSICAL SYSTEMS; PRIVACY PROTECTION; INTERNET; SECURITY; SCHEME; POWER;
D O I
10.1109/ACCESS.2021.3055771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by emerging 5G networks. In this context, complex routing schemes for pervasive infrastructures are highly simplified, as every hardware element may stablish its own communication link with a 5G base station. However, this situation also introduces new risks, especially in the security field where innovative cyber-physical attacks and distributed denial of service attacks are becoming more popular and dangerous each day. Thus, data authentication, protection and anonymization in those new applications and schemes is a key challenge to be addressed. Besides, most devices in future IoT systems will be resource constrained, so traditional solutions based on private keys stored in devices' memory and computationally heavy cryptographic algorithms will turn unsecure, inefficient or, directly, impossible to run. Therefore, in this paper we propose a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. The proposed solution employs both digital watermarking techniques and lightweight cryptographic technologies. To generate keys in a secure and simple manner, physical unclonable functions are employed. Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered. In order to evaluate the performance of the proposed solution an experimental validation based on simulation techniques is also carried out.
引用
收藏
页码:22378 / 22398
页数:21
相关论文
共 50 条
  • [31] Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
    Rajasoundaran, S.
    Prabu, A., V
    Routray, Sidheswar
    Malla, Prince Priya
    Kumar, G. Sateesh
    Mukherjee, Amrit
    Qi, Yinan
    COMPUTER COMMUNICATIONS, 2022, 187 : 71 - 82
  • [32] Massive IoT Access With NOMA in 5G Networks and Beyond Using Online Competitiveness and Learning
    Mlika, Zoubeir
    Cherkaoui, Soumaya
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17): : 13624 - 13639
  • [33] Enhancing IoT connectivity through spectrum sharing in 5G networks
    Singh, Bablu Kumar
    Khatri, Narendra
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (10) : 5018 - 5029
  • [34] Analytical review on secure communication protocols for 5G and IoT networks
    Premalatha, J.
    Swamidason, Iwin Thanakumar Joseph
    Harshavardhanan, Pon
    Anandaraj, S. P.
    Jeyakrishnan, V
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 40 (1-3) : 50 - 66
  • [35] DQ-Based Random Access NOMA for Massive Critical IoT Scenarios in 5G Networks
    Amini, Mohammad Reza
    Al-Habashna, Ala'a
    Wainer, Gabriel
    Boudreau, Gary
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 6363 - 6376
  • [36] Kalman Filter Based Microgrid State Estimation and Control Using the IoT with 5G Networks
    Rana, Md
    Li, Li
    Su, Steven
    2015 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2015,
  • [37] On security of wireless sensor networks: a data authentication protocol using digital signature
    Ferng, Huei-Wen
    Nguyen Minh Khoa
    WIRELESS NETWORKS, 2017, 23 (04) : 1113 - 1131
  • [38] Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
    Mishra, Amit Kumar
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Singh, Jaskaran
    Vasilakos, Athanasios V.
    DRONES, 2023, 7 (08)
  • [39] Token-Based Authentication Framework for 5G MEC Mobile Networks
    Niewolski, Wojciech
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    ELECTRONICS, 2021, 10 (14)
  • [40] 5G Wireless Networks in the Future Renewable Energy Systems
    Strielkowski, Wadim
    Dvorak, Marek
    Rovny, Patrik
    Tarkhanova, Elena
    Baburina, Natalia
    FRONTIERS IN ENERGY RESEARCH, 2021, 9