Open Access Open Access  Restricted Access Subscription Access

One Step toward IoT Authentication in Mobile Systems

HungYu Chienhor,

Abstract


In the coming era of Internet-of-Things (IoT) scenarios, there will be billions of devices frequently accessing the networks. To leverage the merits of high coverage of very wide areas and the very competitive cost-to-performance ratio, many widely-deployed IoT applications would choose public mobile communication systems as their backbone. Among many challenges of deploying mobile-system-based IoT applications, two of the critical challenges regarding of authenticating the devices is tackled in this paper: the intensive communications between the visited networks and the home networks, and the aggregated authentication overhead issue. In this article, we introduce a range-bound key assignment technique to tackle the challenges. The proposed scheme drastically reduces the communication overhead and greatly strengthens the security robustness. The securities are analyzed and are verified using the AVISPA toolset.

Keywords


Authentication; Key Agreement; 5G; Internet-of-Things; formal proof

Citation Format:
HungYu Chienhor, "One Step toward IoT Authentication in Mobile Systems," Communications of the CCISA, vol. 23, no. 4 , pp. 114-136, Oct. 2017.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office, No.1, Sec. 1, Shennong Rd., Yilan City, Yilan County 260, Taiwan (R.O.C.)
E-mail: ccisa.editor@gmail.com