Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System

被引:56
作者
Cao, Jin [1 ]
Yu, Pu [1 ]
Xiang, Xinyin [2 ]
Ma, Maode [3 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Sch Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xian Univ Finance & Econ, Sch Informat, Xian 710100, Shaanxi, Peoples R China
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Access authentication and data transmission; fifth generation (5G); lattice-based homomorphic encryption; narrowband Internet of Things (NB-IoT);
D O I
10.1109/JIOT.2019.2931724
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The narrowband Internet of Things (NB-IoT) system has become an integral part of the future fifth generation (5G) network. Although the NB-IoT system has gradually been improved in the traditional LTE network currently, the NB-IoT system does not have an effective access authentication scheme in the future 5G network. According to the current 3rd Generation Partnership Project (3GPP) standard, NB-IoT devices still use the traditional access authentication method to perform mutual authentication with the network, which may bring a large amount of signaling and communication overhead. This problem will be magnified in a large-scale device environment in the future 5G network. In this article, a quantum resistance access authentication and data distribution scheme is proposed for large-scale NB-IoT devices. The scheme can simultaneously implement access authentication and data transmission of a group of NB-IoT devices based on the lattice-based homomorphic encryption technology. Our scheme not only greatly reduce the network burden but also achieve strong security, including privacy protection and anti-quantum attacks. The performance analysis results show that our scheme has the ideal efficiency.
引用
收藏
页码:9794 / 9805
页数:12
相关论文
共 35 条
[1]  
3GPP, 2018, 33841-070clean.docx, Tech. Rep
[2]  
3rd Generation Partnership Project, 2018, 36300 3GPP TS
[3]  
[Anonymous], 2013, 800561 SP NAT I STAN
[4]  
[Anonymous], IEEE T IND INFORM
[5]  
[Anonymous], 1996, P ELECT C COMPUTATIO
[6]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[7]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[8]   Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network [J].
Cao, Jin ;
Yu, Pu ;
Ma, Maode ;
Gao, Weifeng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1561-1575
[9]   GBAAM: group-based access authentication for MTC in LTE networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) :3282-3299
[10]   Group-Based Authentication and Key Agreement [J].
Chen, Yu-Wen ;
Wang, Jui-Tang ;
Chi, Kuang-Hui ;
Tseng, Chien-Chao .
WIRELESS PERSONAL COMMUNICATIONS, 2012, 62 (04) :965-979