Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking

被引:22
作者
Bordel, Borja [1 ]
Alcarria, Ramon [2 ]
Robles, Tomas [1 ]
Sanchez Iglesias, Marcos [3 ]
机构
[1] Univ Politecn Madrid, Dept Sistemas Informat, Madrid 28031, Spain
[2] Univ Politecn Madrid, Dept Ingn Topog & Cartog, Madrid 28031, Spain
[3] Escuela Super Informat, Ciudad Real 13071, Spain
关键词
5G mobile communication; Authentication; Watermarking; Encryption; Signal processing algorithms; Servers; Routing protocols; 5G networks; Internet-of-Things; digital watermarking; physical unclonable functions; data authentication; chaotic encryption; CYBER-PHYSICAL SYSTEMS; PRIVACY PROTECTION; INTERNET; SECURITY; SCHEME; POWER;
D O I
10.1109/ACCESS.2021.3055771
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future Internet-of-Things (IoT) scenarios and applications are envisioned to be supported by emerging 5G networks. In this context, complex routing schemes for pervasive infrastructures are highly simplified, as every hardware element may stablish its own communication link with a 5G base station. However, this situation also introduces new risks, especially in the security field where innovative cyber-physical attacks and distributed denial of service attacks are becoming more popular and dangerous each day. Thus, data authentication, protection and anonymization in those new applications and schemes is a key challenge to be addressed. Besides, most devices in future IoT systems will be resource constrained, so traditional solutions based on private keys stored in devices' memory and computationally heavy cryptographic algorithms will turn unsecure, inefficient or, directly, impossible to run. Therefore, in this paper we propose a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. The proposed solution employs both digital watermarking techniques and lightweight cryptographic technologies. To generate keys in a secure and simple manner, physical unclonable functions are employed. Besides, to reduce as much as possible the computational cost of algorithms, chaotic dynamics will be considered. In order to evaluate the performance of the proposed solution an experimental validation based on simulation techniques is also carried out.
引用
收藏
页码:22378 / 22398
页数:21
相关论文
共 50 条
  • [41] An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
    Huang, Haiou
    Hu, Liang
    Chu, Jianfeng
    Cheng, Xiaochun
    IEEE ACCESS, 2019, 7 : 175970 - 175979
  • [42] A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications
    Goudos, Sotirios K.
    Dallas, Panagiotis I.
    Chatziefthymiou, Stella
    Kyriazakos, Sofoklis
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 1645 - 1675
  • [43] A Proxy Signature-Based Drone Authentication in 5G D2D Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [44] Blockchain-Based Federated Learning in UAVs Beyond 5G Networks: A Solution Taxonomy and Future Directions
    Saraswat, Deepti
    Verma, Ashwin
    Bhattacharya, Pronaya
    Tanwar, Sudeep
    Sharma, Gulshan
    Bokoro, Pitshou N.
    Sharma, Ravi
    IEEE ACCESS, 2022, 10 : 33154 - 33182
  • [45] Location based Authentication Service using 4G/5G Devices
    Nisar, Farhan
    2019 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2019, : 120 - 126
  • [46] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [47] Authentication and Resource Allocation Strategies during Handoff for 5G IoVs Using Deep Learning
    Hemavathi
    Akhila, Sreenatha Reddy
    Alotaibi, Youseef
    Khalaf, Osamah Ibrahim
    Alghamdi, Saleh
    ENERGIES, 2022, 15 (06)
  • [48] Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
    Kamal Ali Alezabi
    Fazirulhisyam Hashim
    Shaiful J. Hashim
    Borhanuddin M. Ali
    Abbas Jamalipour
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [49] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [50] Amassing the Security: An Enhanced Authentication Protocol for Drone Communications over 5G Networks
    Wu, Tsuyang
    Guo, Xinglan
    Chen, Yehcheng
    Kumari, Saru
    Chen, Chienming
    DRONES, 2022, 6 (01)