Next Article in Journal
Highly Selective Electrochemiluminescence Sensor Based on Molecularly Imprinted-quantum Dots for the Sensitive Detection of Cyfluthrin
Next Article in Special Issue
The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services
Previous Article in Journal
Optimal Energy Consumption Tasks Scheduling Strategy for Multi-Radio WSNs
Previous Article in Special Issue
Lightweight Data-Security Ontology for IoT
Article

Secure Authentication and Credential Establishment in Narrowband IoT and 5G

1
Department of Information and Communications Engineering, Faculty of Computer Science, University of Murcia, 30100 Murcia, Spain
2
Odin Solutions SL, 30820 Murcia, Spain
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(3), 882; https://doi.org/10.3390/s20030882
Received: 9 December 2019 / Revised: 18 January 2020 / Accepted: 5 February 2020 / Published: 7 February 2020
(This article belongs to the Special Issue Selected Papers from the 3rd Global IoT Summit)
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments. View Full-Text
Keywords: Internet of Things; narrowband IoT; 5G; bootstrapping; authentication; EAP Internet of Things; narrowband IoT; 5G; bootstrapping; authentication; EAP
Show Figures

Figure 1

MDPI and ACS Style

Sanchez-Gomez, J.; Garcia-Carrillo, D.; Marin-Perez, R.; Skarmeta, A.F. Secure Authentication and Credential Establishment in Narrowband IoT and 5G. Sensors 2020, 20, 882. https://doi.org/10.3390/s20030882

AMA Style

Sanchez-Gomez J, Garcia-Carrillo D, Marin-Perez R, Skarmeta AF. Secure Authentication and Credential Establishment in Narrowband IoT and 5G. Sensors. 2020; 20(3):882. https://doi.org/10.3390/s20030882

Chicago/Turabian Style

Sanchez-Gomez, Jesus, Dan Garcia-Carrillo, Rafael Marin-Perez, and Antonio F. Skarmeta. 2020. "Secure Authentication and Credential Establishment in Narrowband IoT and 5G" Sensors 20, no. 3: 882. https://doi.org/10.3390/s20030882

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop