Skip to main content

Aggregate Authentication for Massive Internet of Things in 5G Networks

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1121))

Included in the following conference series:

  • 286 Accesses

Abstract

Massive Internet of Things (IoT) applications are characterized by a massive number of low-powered devices with small data storage. In those applications, authentication is very important to guarantee the origin of data produced by each device. With such characteristics, the authentication scheme needs to have small footprint and low complexity computation. Likewise, the number of authentication signaling needs to be significantly reduced to accommodate massive amount of IoT devices trying to connect to the network simultaneously, which is similar to Denial of Service (DoS) attacks. In 3GPP TR 33.899 V1.3.0, an architecture of the authentication system that consists of the aggregation nodes and the authenticators is proposed. The aggregation nodes receive the authenticated data from the devices and send the aggregated authenticated data to the authenticators. In this article, we discuss the possibility to implement more efficient authentication scheme for a massive Internet of Things (IoT) applications enabled in 5G networks. In particular, we analyze the performance of the system using some signature aggregation methods and identify the main research challenges in this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3GPP: Study on the security aspects of the next generation system (release 14). Technical report, August 2017

    Google Scholar 

  2. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_30

    Chapter  Google Scholar 

  3. Cheon, J.H., Kim, Y., Yoon, H., et al.: A new ID-based signature with batch verification. IACR Cryptol. ePrint Arch. 2004, 131 (2004)

    Google Scholar 

  4. Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(4), 41–70 (2018)

    Google Scholar 

  5. Drucker, N., Gueron, S.: Achieving trustworthy homomorphic encryption by combining it with a trusted execution environment. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(1), 86–99 (2018)

    Google Scholar 

  6. Ericsson: Cellular networks for massive IoT. Technical report, January 2016

    Google Scholar 

  7. Gentry, C., Ramzan, Z.: Identity-based aggregate signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 257–273. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_17

    Chapter  Google Scholar 

  8. Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online social networks (POSNs). J. Int. Serv. Inf. Secur. (JISIS) 8(2), 48–86 (2018)

    Google Scholar 

  9. Herranz, J.: Deterministic identity-based signatures for partial aggregation. Comput. J. 49(3), 322–330 (2005)

    Article  Google Scholar 

  10. Hohenberger, S., Sahai, A., Waters, B.: Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 494–512. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_27

    Chapter  Google Scholar 

  11. James, M., et al.: The internet of things: Mapping the value beyond the hype. McKinsey Global Institute 3 (2015)

    Google Scholar 

  12. Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile internet of things security monitoring. J. Int. Serv. Inf. Secur. (JISIS) 8(3), 54–63 (2018)

    Google Scholar 

  13. Madueño, G.C., Pratas, N., Stefanovic, C., Popovski, P.: Cellular 5G access for massive internet of things. In: Key Technologies for 5G Wireless Systems, pp. 380–391. Cambridge University Press (2017)

    Google Scholar 

  14. Selvi, S.S.D., Vivek, S.S., Shriram, J., Rangan, C.P.: Identity based partial aggregate signature scheme without pairing. In: 2012 35th IEEE Sarnoff Symposium, pp. 1–6. IEEE (2012)

    Google Scholar 

  15. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  16. Yuan, Y., Zhan, Q., Huang, H.: Efficient unrestricted identity-based aggregate signature scheme. PLoS One 9(10), e110100 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ilsun You .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Syalim, A., Anggorojati, B., Baek, J., Gerbi, D., You, I. (2020). Aggregate Authentication for Massive Internet of Things in 5G Networks. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9609-4_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9608-7

  • Online ISBN: 978-981-15-9609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics