2020
DOI: 10.3390/s20030882
|View full text |Cite
|
Sign up to set email alerts
|

Secure Authentication and Credential Establishment in Narrowband IoT and 5G

Abstract: Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…This shows the importance of a secure activation mechanism, both in the network initialization phase and in the phase of updating the firmware or the keying material. A lightweight bootstrapping protocol for authentication and establishing credentials for 4G/5G and Narrow-Band IoT (NB-IoT) networks is presented in [38]. The proposal finds LO-CoAP-EAP as a feasible and efficient solution for NB-IoT and 5G networks.…”
Section: Previous and Related Workmentioning
confidence: 99%
“…In the Long-Term Evolution-Advanced (LTE-A) networks, many protocols are formulated for access security issues [19][20][21][22][23][24][25][26][27]. In addition, many researchers are paying attention to security of IoT deployment under the 5G network or some other advanced architecture [28][29][30][31]. According to the research findings, the current research on a large number of equipment access authentication process in the network, and these schemes are mainly categorized into the following two types.…”
Section: Related Workmentioning
confidence: 99%