• Login
    View Item 
    •   Home
    • Research Publications
    • Engineering & Technology
    • Department of Electronics, Computing & Maths
    • View Item
    •   Home
    • Research Publications
    • Engineering & Technology
    • Department of Electronics, Computing & Maths
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UDORACommunitiesTitleAuthorsIssue DateSubmit DateSubjectsThis CollectionTitleAuthorsIssue DateSubmit DateSubjects

    My Account

    LoginRegister

    About and further information

    AboutOpen Access WebpagesOpen Access PolicyTake Down Policy University Privacy NoticeUniversity NewsTools for ResearchersLibraryUDo

    Statistics

    Display statistics

    Authentic-caller: Self-enforcing authentication in a next generation network

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Azad, Muhammad Ajmal
    Bag, Samiran
    Perera, Charith
    Barhamgi, Mahmoud
    Hao, Feng
    Affiliation
    University of Derby
    University of Warwick
    Computational Informatics, CSIRO, Canberra, Australian Capital Territory Australia
    Universite Claude Bernard, Lyon, France
    Issue Date
    2019-09-19
    
    Metadata
    Show full item record
    Abstract
    The Internet of Things (IoT) or the Cyber-Physical System (CPS) is the network of connected devices, things and people which collect and exchange information using the emerging telecommunication networks (4G, 5G IP-based LTE). These emerging telecommunication networks can also be used to transfer critical information between the source and destination, informing the control system about the outage in the electrical grid, or providing information about the emergency at the national express highway. This sensitive information requires authorization and authentication of source and destination involved in the communication. To protect the network from unauthorized access and to provide authentication, the telecommunication operators have to adopt the mechanism for seamless verification and authorization of parties involved in the communication. Currently, the next-generation telecommunication networks use a digest-based authentication mechanism, where the call-processing engine of the telecommunication operator initiates the challenge to the request-initiating client or caller, which is being solved by the client to prove his credentials. However, the digest-based authentication mechanisms are vulnerable to many forms of known attacks e.g., the Man-In-The-Middle (MITM) attack and the password guessing attack. Furthermore, the digest-based systems require extensive processing overheads. Several Public-Key Infrastructure (PKI) based and identity-based schemes have been proposed for the authentication and key agreements. However, these schemes generally require smart-card to hold long-term private keys and authentication credentials. In this paper, we propose a novel self-enforcing authentication protocol for the SIPbased next-generation network based on a low-entropy shared password without relying on any PKI or trusted third party system. The proposed system shows effective resistance against various attacks e.g., MITM, replay attack, password guessing attack, etc. We analyze the security properties of the proposed scheme in comparison to the state of the art.
    Citation
    Azad, M.A., Bag, S., Perera, C., Barhamgi, M. and Hao, F., (2019). 'Authentic-caller: Self-enforcing authentication in a next generation network'. IEEE Transactions on Industrial Informatics, pp. 1-9. DOI: 10.1109/TII.2019.2941724.
    Publisher
    Institute of Electrical and Electronics Engineers (IEEE)
    Journal
    IEEE Transactions on Industrial Informatics
    URI
    http://hdl.handle.net/10545/624446
    DOI
    10.1109/tii.2019.2941724
    Additional Links
    https://ieeexplore.ieee.org/document/8844829/authors#authors
    http://wrap.warwick.ac.uk/126047/
    Type
    Article
    Language
    en
    ISSN
    15513203
    EISSN
    19410050
    ae974a485f413a2113503eed53cd6c53
    10.1109/tii.2019.2941724
    Scopus Count
    Collections
    Department of Electronics, Computing & Maths

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.