Open Access
Subscription Access
One Step toward IoT Authentication in Mobile Systems
Abstract
In the coming era of Internet-of-Things (IoT) scenarios, there will be billions of devices frequently accessing the networks. To leverage the merits of high coverage of very wide areas and the very competitive cost-to-performance ratio, many widely-deployed IoT applications would choose public mobile communication systems as their backbone. Among many challenges of deploying mobile-system-based IoT applications, two of the critical challenges regarding of authenticating the devices is tackled in this paper: the intensive communications between the visited networks and the home networks, and the aggregated authentication overhead issue. In this article, we introduce a range-bound key assignment technique to tackle the challenges. The proposed scheme drastically reduces the communication overhead and greatly strengthens the security robustness. The securities are analyzed and are verified using the AVISPA toolset.
Keywords
Authentication; Key Agreement; 5G; Internet-of-Things; formal proof
Citation Format:
HungYu Chienhor, "One Step toward IoT Authentication in Mobile Systems," Communications of the CCISA, vol. 23, no. 4 , pp. 114-136, Oct. 2017.
HungYu Chienhor, "One Step toward IoT Authentication in Mobile Systems," Communications of the CCISA, vol. 23, no. 4 , pp. 114-136, Oct. 2017.
Full Text:
PDFRefbacks
- There are currently no refbacks.
Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office
E-mail: ccisa.editor@gmail.com