Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Authentic-caller: self-enforcing authentication in a next generation network

Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith ORCID: https://orcid.org/0000-0002-0190-3346, Barhamgi, Mahmoud and Feng, Hao 2020. Authentic-caller: self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics 16 (5) , pp. 3606-3615. 10.1109/TII.2019.2941724

[thumbnail of _IEEE_Trans__Authentic_Caller.pdf]
Preview
PDF - Accepted Post-Print Version
Download (713kB) | Preview

Abstract

The Internet of Things (IoT) or the Cyber-Physical System (CPS) is the network of connected devices, things and people which collect and exchange information using the emerging telecommunication networks (4G, 5G IP-based LTE). These emerging telecommunication networks can also be used to transfer critical information between the source and destination, informing the control system about the outage in the electrical grid, or providing information about the emergency at the national express highway. This sensitive information requires authorization and authentication of source and destination involved in the communication. To protect the network from unauthorized access and to provide authentication, the telecommunication operators have to adopt the mechanism for seamless verification and authorization of parties involved in the communication. Currently, the next-generation telecommunication networks use a digest-based authentication mechanism, where the call-processing engine of the telecommunication operator initiates the challenge to the request-initiating client or caller, which is being solved by the client to prove his credentials. However, the digest-based authentication mechanisms are vulnerable to many forms of known attacks e.g., the Man-In-The-Middle (MITM) attack and the password guessing attack. Furthermore, the digest-based systems require extensive processing overheads. Several Public-Key Infrastructure (PKI) based and identity-based schemes have been proposed for the authentication and key agreements. However, these schemes generally require smart-card to hold long-term private keys and authentication credentials. In this paper, we propose a novel self-enforcing authentication protocol for the SIPbased next-generation network based on a low-entropy shared password without relying on any PKI or trusted third party system. The proposed system shows effective resistance against various attacks e.g., MITM, replay attack, password guessing attack, etc. We analyze the security properties of the proposed scheme in comparison to the state of the art.

Item Type: Article
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA76 Computer software
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
ISSN: 1551-3203
Date of First Compliant Deposit: 30 September 2019
Date of Acceptance: 8 September 2019
Last Modified: 12 Nov 2023 12:31
URI: https://orca.cardiff.ac.uk/id/eprint/125716

Citation Data

Cited 11 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item

Downloads

Downloads per month over past year

View more statistics