Openly accessible

A Novel Cross-Layer Authentication Protocol for the Internet of Things

Lee, Y, Yoon, J, Choi, Jinho and Hwang, E 2020, A Novel Cross-Layer Authentication Protocol for the Internet of Things, IEEE Access, vol. 8, pp. 196135-196150, doi: 10.1109/ACCESS.2020.3033562.

Attached Files
Name Description MIMEType Size Downloads
choi-novelcrosslayer-2020.pdf Published version application/pdf 2.34MB 12

Title A Novel Cross-Layer Authentication Protocol for the Internet of Things
Author(s) Lee, Y
Yoon, J
Choi, JinhoORCID iD for Choi, Jinho orcid.org/0000-0002-4895-6680
Hwang, E
Journal name IEEE Access
Volume number 8
Start page 196135
End page 196150
Total pages 16
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2020-10-26
ISSN 2169-3536
2169-3536
Keyword(s) Science & Technology
Technology
Computer Science, Information Systems
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
Authentication
Protocols
Programmable logic arrays
Cryptography
Computer architecture
Internet of Things
Authentication and key agreement
physical layer authentication
KEY AGREEMENT
SECURITY
LTE
CHALLENGES
SYSTEMS
5G
Summary An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems. Due to dramatic increases in the number of cellular IoT devices, a centralized authentication architecture in which a mobility management entity in core networks administers authentication of massive numbers of IoT devices may cause network congestion with large signaling overhead. Thus, a distributed authentication architecture in which a base station in radio access networks authenticates IoT devices locally is presented. In addition, a cross-layer authentication protocol is designed with a novel integration strategy under the distributed authentication architecture, where PLA, which employs physical features for authentication, is used as preemptive authentication in the proposed protocol. Theoretical analysis and numerical simulations were performed to analyze the trade-off between authentication performance and overhead in the proposed authentication method compared with existing authentication protocols. The results demonstrate that the proposed protocol outperforms conventional authentication and key agreement protocols in terms of overhead and computational complexity while guaranteeing low authentication error probability.
Language eng
DOI 10.1109/ACCESS.2020.3033562
Indigenous content off
Field of Research 08 Information and Computing Sciences
09 Engineering
10 Technology
HERDC Research category C1 Refereed article in a scholarly journal
Free to Read? Yes
Use Rights Creative Commons Attribution licence
Persistent URL http://hdl.handle.net/10536/DRO/DU:30146413

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 20 Abstract Views, 13 File Downloads  -  Detailed Statistics
Created: Tue, 05 Jan 2021, 13:22:42 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.