
The Library
Authentic-caller : self-enforcing authentication in a next generation network
Tools
Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith, Barhamgi, Mahmoud and Hao, Feng (2020) Authentic-caller : self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics, 16 (5). pp. 3606-3615. doi:10.1109/TII.2019.2941724 ISSN 1551-3203.
|
PDF
WRAP-Authentic-caller-self-enforcing-authentication-network-Hao-2019.pdf - Accepted Version - Requires a PDF viewer. Download (986Kb) | Preview |
Official URL: http://dx.doi.org/10.1109/TII.2019.2941724
Abstract
The Internet of Things (IoT) or the Cyber-Physical System (CPS) is the network of connected devices, things and people which collect and exchange information using the emerging telecommunication networks (4G, 5G IP-based LTE). These emerging telecommunication networks can also be used to transfer critical information between the source and destination, informing the control system about the outage in the electrical grid, or providing information about the emergency at the national express highway. This sensitive information requires authorization and authentication of source and destination involved in the communication. To protect the network from unauthorized access and to provide authentication, the telecommunication operators have to adopt the mechanism for seamless verification and authorization of parties involved in the communication. Currently, the next-generation telecommunication networks use a digest-based authentication mechanism, where the call-processing engine of the telecommunication operator initiates the challenge to the request-initiating client or caller, which is being solved by the client to prove his credentials. However, the digest-based authentication mechanisms are vulnerable to many forms of known attacks e.g., the Man-In-The-Middle (MITM) attack and the password guessing attack. Furthermore, the digest-based systems require extensive processing overheads. Several Public-Key Infrastructure (PKI) based and identity-based schemes have been proposed for the authentication and key agreements. However, these schemes generally require smart-card to hold long-term private keys and authentication credentials. In this paper, we propose a novel self-enforcing authentication protocol for the SIPbased next-generation network based on a low-entropy shared password without relying on any PKI or trusted third party system. The proposed system shows effective resistance against various attacks e.g., MITM, replay attack, password guessing attack, etc. We a...
Item Type: | Journal Article | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Subjects: | H Social Sciences > HV Social pathology. Social and public welfare K Law [LC] > K Law (General) T Technology > TK Electrical engineering. Electronics Nuclear engineering |
|||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | |||||||||
Library of Congress Subject Headings (LCSH): | Session Initiation Protocol (Computer network protocol), Computer network protocols -- Computer programs, Online identity theft , Authentication | |||||||||
Journal or Publication Title: | IEEE Transactions on Industrial Informatics | |||||||||
Publisher: | IEEE | |||||||||
ISSN: | 1551-3203 | |||||||||
Official Date: | May 2020 | |||||||||
Dates: |
|
|||||||||
Volume: | 16 | |||||||||
Number: | 5 | |||||||||
Page Range: | pp. 3606-3615 | |||||||||
DOI: | 10.1109/TII.2019.2941724 | |||||||||
Status: | Peer Reviewed | |||||||||
Publication Status: | Published | |||||||||
Reuse Statement (publisher, data, author rights): | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||
Access rights to Published version: | Restricted or Subscription Access | |||||||||
Date of first compliant deposit: | 25 September 2019 | |||||||||
Date of first compliant Open Access: | 25 September 2019 | |||||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year