Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Title | Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | de Matos Patrocínio dos Santos, Bernardo, Dzogovic, Bruno, Feng, Boning, Do, Van Thuan, Jacot, Niels, van Do, Thanh |
Conference Name | 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) |
Date Published | jun |
Keywords | 5G mobile communication, 5G networks, cellular IoT, cellular network architecture, cellular radio, cloud computing, composability, Computer crime, Conferences, Cross Layer Security, Cross-Layer Security, edge computing, Identity management, Identity provider, Internet of Things, IoT device, IoT platform, IoT security, message authentication, Mobile Identity Management, mobile network infrastructure, Narrowband IoT, NB-IOT, pubcrawl, Resiliency, Scalability, Scalable Security, secure authentication mechanism, security mechanisms, telecommunication security |
Abstract | Upon the new paradigm of Cellular Internet of Things, through the usage of technologies such as Narrowband IoT (NB-IoT), a massive amount of IoT devices will be able to use the mobile network infrastructure to perform their communications. However, it would be beneficial for these devices to use the same security mechanisms that are present in the cellular network architecture, so that their connections to the application layer could see an increase on security. As a way to approach this, an identity management and provisioning mechanism, as well as an identity federation between an IoT platform and the cellular network is proposed as a way to make an IoT device deemed worthy of using the cellular network and perform its actions. |
DOI | 10.1109/CSCloud/EdgeCom.2019.000-7 |
Citation Key | de_matos_patrocinio_dos_santos_towards_2019 |
- Internet of Things
- telecommunication security
- security mechanisms
- secure authentication mechanism
- Scalable Security
- Scalability
- pubcrawl
- NB-IOT
- Narrowband IoT
- mobile network infrastructure
- Mobile Identity Management
- message authentication
- IoT security
- IoT platform
- IoT device
- composability
- Identity provider
- Identity management
- edge computing
- Cross-Layer Security
- Conferences
- Computer crime
- Cloud Computing
- cellular radio
- cellular network architecture
- cellular IoT
- 5G networks
- 5G mobile communication
- Cross Layer Security
- Resiliency