Abstract
Massive Internet of Things (IoT) applications are characterized by a massive number of low-powered devices with small data storage. In those applications, authentication is very important to guarantee the origin of data produced by each device. With such characteristics, the authentication scheme needs to have small footprint and low complexity computation. Likewise, the number of authentication signaling needs to be significantly reduced to accommodate massive amount of IoT devices trying to connect to the network simultaneously, which is similar to Denial of Service (DoS) attacks. In 3GPP TR 33.899 V1.3.0, an architecture of the authentication system that consists of the aggregation nodes and the authenticators is proposed. The aggregation nodes receive the authenticated data from the devices and send the aggregated authenticated data to the authenticators. In this article, we discuss the possibility to implement more efficient authentication scheme for a massive Internet of Things (IoT) applications enabled in 5G networks. In particular, we analyze the performance of the system using some signature aggregation methods and identify the main research challenges in this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
3GPP: Study on the security aspects of the next generation system (release 14). Technical report, August 2017
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30
Cheon, J.H., Kim, Y., Yoon, H., et al.: A new ID-based signature with batch verification. IACR Cryptol. ePrint Arch. 2004, 131 (2004)
Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(4), 41–70 (2018)
Drucker, N., Gueron, S.: Achieving trustworthy homomorphic encryption by combining it with a trusted execution environment. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(1), 86–99 (2018)
Ericsson: Cellular networks for massive IoT. Technical report, January 2016
Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_17
Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online social networks (POSNs). J. Int. Serv. Inf. Secur. (JISIS) 8(2), 48–86 (2018)
Herranz, J.: Deterministic identity-based signatures for partial aggregation. Comput. J. 49(3), 322–330 (2005)
Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494–512. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_27
James, M., et al.: The internet of things: Mapping the value beyond the hype. McKinsey Global Institute 3 (2015)
Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile internet of things security monitoring. J. Int. Serv. Inf. Secur. (JISIS) 8(3), 54–63 (2018)
Madueño, G.C., Pratas, N., Stefanovic, C., Popovski, P.: Cellular 5G access for massive internet of things. In: Key Technologies for 5G Wireless Systems, pp. 380–391. Cambridge University Press (2017)
Selvi, S.S.D., Vivek, S.S., Shriram, J., Rangan, C.P.: Identity based partial aggregate signature scheme without pairing. In: 2012 35th IEEE Sarnoff Symposium, pp. 1–6. IEEE (2012)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Yuan, Y., Zhan, Q., Huang, H.: Efficient unrestricted identity-based aggregate signature scheme. PLoS One 9(10), e110100 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Syalim, A., Anggorojati, B., Baek, J., Gerbi, D., You, I. (2020). Aggregate Authentication for Massive Internet of Things in 5G Networks. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-9609-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9608-7
Online ISBN: 978-981-15-9609-4
eBook Packages: Computer ScienceComputer Science (R0)