• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

窄带物联网和5G中的安全认证与凭证建立

Secure Authentication and Credential Establishment in Narrowband IoT and 5G.

作者信息

Sanchez-Gomez Jesus, Garcia-Carrillo Dan, Marin-Perez Rafael, Skarmeta Antonio F

机构信息

Department of Information and Communications Engineering, Faculty of Computer Science, University of Murcia, 30100 Murcia, Spain.

Odin Solutions SL, 30820 Murcia, Spain.

出版信息

Sensors (Basel). 2020 Feb 7;20(3):882. doi: 10.3390/s20030882.

DOI:10.3390/s20030882
PMID:32045992
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7038755/
Abstract

Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.

摘要

安全性在新型物联网和5G网络的部署与维护中至关重要。引导过程是在物联网设备和数据驱动平台之间建立安全数据交换所必需的。这一过程除其他步骤外,还涉及认证、授权和凭证管理。然而,在连接到诸如窄带物联网(NB-IoT)和5G等最新无线网络的受限物联网设备领域,致力于提供服务访问认证的工作却很少。因此,本文提出了对引导协议进行调整,使其符合3GPP规范,以便为受限物联网设备启用二次认证的5G功能。为了在NB-IoT和4G/5G环境中实现二次认证和密钥建立,我们对两个可扩展认证协议(EAP)下层进行了调整,即PANATIKI和LO-CoAP-EAP。实际上,这种方法对上述两个EAP下层进行了评估,展示了当前EAP下层标准(即PANA)与专门针对物联网约束设计的标准之间的对比,从而在5G网络的引导过程中提供了高度的灵活性和可扩展性。对所提出的解决方案进行了评估,以证明其效率和可行性,这是为5G环境中受限物联网设备支持安全服务认证和密钥建立所做的首批努力之一。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/f8674636cf45/sensors-20-00882-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/3879cb2c7931/sensors-20-00882-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/d0e3c0adb9ef/sensors-20-00882-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/a49b1bf141d9/sensors-20-00882-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/4ccb0c1ee4d1/sensors-20-00882-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/de40fbfab20d/sensors-20-00882-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/2fdfe34ae165/sensors-20-00882-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/f8674636cf45/sensors-20-00882-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/3879cb2c7931/sensors-20-00882-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/d0e3c0adb9ef/sensors-20-00882-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/a49b1bf141d9/sensors-20-00882-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/4ccb0c1ee4d1/sensors-20-00882-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/de40fbfab20d/sensors-20-00882-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/2fdfe34ae165/sensors-20-00882-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b7e8/7038755/f8674636cf45/sensors-20-00882-g007.jpg

相似文献

1
Secure Authentication and Credential Establishment in Narrowband IoT and 5G.窄带物联网和5G中的安全认证与凭证建立
Sensors (Basel). 2020 Feb 7;20(3):882. doi: 10.3390/s20030882.
2
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.用于物联网的轻量级基于CoAP的引导服务。
Sensors (Basel). 2016 Mar 11;16(3):358. doi: 10.3390/s16030358.
3
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.一种用于低功耗广域网的基于受限应用协议(CoAP)的网络访问认证服务:LO-CoAP-EAP。
Sensors (Basel). 2017 Nov 17;17(11):2646. doi: 10.3390/s17112646.
4
PANATIKI: a network access control implementation based on PANA for IoT devices.PANATIKI:一种基于 PANA 的物联网设备网络访问控制实现。
Sensors (Basel). 2013 Nov 1;13(11):14888-917. doi: 10.3390/s131114888.
5
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB.物联网的企业安全:使用 EAP-NOOB 的轻量级引导。
Sensors (Basel). 2020 Oct 27;20(21):6101. doi: 10.3390/s20216101.
6
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.物联网中用于认证和授权的机器学习:分类法、挑战与未来研究方向
Sensors (Basel). 2021 Jul 28;21(15):5122. doi: 10.3390/s21155122.
7
A Lightweight Continuous Authentication Protocol for the Internet of Things.一种用于物联网的轻量级连续认证协议。
Sensors (Basel). 2018 Apr 5;18(4):1104. doi: 10.3390/s18041104.
8
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy.5G-AKA-FS:一种用于前向保密的5G认证与密钥协商协议。
Sensors (Basel). 2023 Dec 27;24(1):159. doi: 10.3390/s24010159.
9
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.基于边缘的物联网部署的轻量级设备认证和密钥管理机制(LDAKM-EIoT)
Sensors (Basel). 2019 Dec 14;19(24):5539. doi: 10.3390/s19245539.
10
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments.用于多网关物联网环境的安全三因素认证协议
Sensors (Basel). 2019 May 22;19(10):2358. doi: 10.3390/s19102358.

引用本文的文献

1
A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions.低功耗广域网安全性调查:威胁、挑战与潜在解决方案
Sensors (Basel). 2020 Oct 14;20(20):5800. doi: 10.3390/s20205800.

本文引用的文献

1
Narrowband Internet of Things (NB-IoT): From Physical (PHY) and Media Access Control (MAC) Layers Perspectives.窄带物联网(NB-IoT):从物理(PHY)层和媒体访问控制(MAC)层角度看
Sensors (Basel). 2019 Jun 8;19(11):2613. doi: 10.3390/s19112613.
2
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.通过轻量级和经过认证的密钥管理方法增强 LoRaWAN 安全性。
Sensors (Basel). 2018 Jun 5;18(6):1833. doi: 10.3390/s18061833.
3
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.
一种用于低功耗广域网的基于受限应用协议(CoAP)的网络访问认证服务:LO-CoAP-EAP。
Sensors (Basel). 2017 Nov 17;17(11):2646. doi: 10.3390/s17112646.
4
State of the Art in LP-WAN Solutions for Industrial IoT Services.工业物联网服务的低功耗广域网解决方案的技术现状
Sensors (Basel). 2016 May 17;16(5):708. doi: 10.3390/s16050708.
5
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.用于物联网的轻量级基于CoAP的引导服务。
Sensors (Basel). 2016 Mar 11;16(3):358. doi: 10.3390/s16030358.
6
PANATIKI: a network access control implementation based on PANA for IoT devices.PANATIKI:一种基于 PANA 的物联网设备网络访问控制实现。
Sensors (Basel). 2013 Nov 1;13(11):14888-917. doi: 10.3390/s131114888.